This paper describes a novel distributed algorithm for use in remote-sensing, medical image analysis, and surveillance applications. The algorithm combines spectra I-screening classification with the principal compone...
详细信息
This paper describes a novel distributed algorithm for use in remote-sensing, medical image analysis, and surveillance applications. The algorithm combines spectra I-screening classification with the principal component transform, and human-centered mapping. It fuses a multi- or hyper-spectral image set into a single color-composite image that maximizes the impact of spectral variation on the human visual system. The algorithm operates on distributed collections of shared-memory multiprocessors that are connected through high-performance networking. Scenes taken from a standard 210 frame remote-sensing data set, collected with the hyper-spectral digital imagery collection experiment airborne imaging spectrometer, are used to assess the algorithms image quality, performance, and scaling. The algorithm is supported with a predictive analytical model that allows its performance to be assessed for a wide variety of typical variations in use. For example, changes to the number of spectra, image resolution, processor speed, memory size, network bandwidth/latency, and granularity of decomposition. The motivation in building a performance model is to assess the impact of changes in technology and problem size associated with different applications, allowing cost-performance tradeoffs to be assessed. (C) 2003 Elsevier Science (USA). All rights reserved.
A dynamic ad-hoc network consists of a collection of mobile hosts with frequently changing network topology. We propose a distributed algorithm that adapts to the topology by utilizing spanning trees in the regions wh...
详细信息
A dynamic ad-hoc network consists of a collection of mobile hosts with frequently changing network topology. We propose a distributed algorithm that adapts to the topology by utilizing spanning trees in the regions where the topology is stable, and resorting to an intelligent flooding-like approach in highly dynamic regions of the network. Routing is performed using the spanning trees based a hold-and-forward or shuttling mechanisms. We introduce the notion of connectivity-through-time and the parameter holding-time as new fundamental concepts that can be used by ad-hoc routing algorithms. For various network connectivity scenarios we evaluate the impact of these concepts on the performance of ad-hoc routing algorithms. Using simulation, we study the throughput, reachability and message-reachability ratio of the proposed schemes under various connection/disconnection rates and holding times.
We introduce an efficient distributed algorithm for tracking multiple targets in an ad hoc sensor network. The key idea is to explicitly model an intermediate representation, which we refer to as individual track cont...
详细信息
ISBN:
(纸本)0972184449
We introduce an efficient distributed algorithm for tracking multiple targets in an ad hoc sensor network. The key idea is to explicitly model an intermediate representation, which we refer to as individual track contributions, so that the effect of measurements observed by a node of the sensor network can be incorporated locally. Furthermore, since targets affect the observations of a local neighborhood of sensor nodes, communications are limited to local regions around currently known targets. A particularly important problem in multiple target tracking is the problem of data association. Since a sensor network is capable of measuring heterogeneous data, we divide the possible resolutions of ambiguity in data association into three categories. Discriminatory information is: (1) immediately available to resolve the ambiguity in data association, (2) delayed to resolve the ambiguity, and (3) unavailable. In this paper, we demonstrate the incorporation of target identity information when discriminatory information is available and a factored representation of tracks when discriminatory information is unavailable. We build efficiency into the tracking algorithm by triggering the extraction of discriminatory information and triggering the use of such information during tracking only when it is deemed necessary.
distributed power-control algorithms for systems with hard signal-to-interference ratio (SIR) constraints may diverge when infeasibility arises. In this paper, we present a power-control framework called utility-based...
详细信息
distributed power-control algorithms for systems with hard signal-to-interference ratio (SIR) constraints may diverge when infeasibility arises. In this paper, we present a power-control framework called utility-based power control (UBPC) by reformulating the problem using a softened SIR requirement (utility) and adding a penalty on power consumption (cost). Under this framework, the goal is to maximize the net utility, defined as utility minus cost. Although UBPC is still noncooperative and distributed in nature, some degree of cooperation emerges: a user will automatically decrease its target SIR (and may even turn off transmission) when it senses that traffic congestion is building up. This framework enables us to improve system convergence and to satisfy heterogeneous service requirements (such as delay and bit error rate) for integrated networks with both voice users and data users. Fairness, adaptiveness, and a high degree of flexibility can be achieved by properly tuning parameters in UBPC.
This paper presents handoff management schemes for synchronization algorithms for wireless multimedia systems. The synchronization and handoff management schemes allow mobile hosts to receive time-dependant multimedia...
详细信息
This paper presents handoff management schemes for synchronization algorithms for wireless multimedia systems. The synchronization and handoff management schemes allow mobile hosts to receive time-dependant multimedia streams without delivery interruption while moving from one cell to another. They also maintain the correct ordering of the media components, through the execution of the wireless multimedia application by a means of timestamped messages passed among mobile hosts, base stations and servers. The timestamp values are used to compute the delay for each multimedia unit for each server. Furthermore, the proposed schemes always search for a quasi-receiver among the base stations with which the mobile hosts can communicate to synchronize multimedia units. We discuss the algorithms and present a set of simulation experiments that evaluate the performance of our schemes, using message complexity and buffer usage at each frame arrival time. Our results indicate that. our schemes exhibit no underflow or overflow within the bounded delivery time. (C) 2002 Published by Elsevier Science B.V.
Unreliable failure detectors introduced by Chandra and Toueg are abstract mechanisms that provide information on process failures. On the one hand, failure detectors allow to state the minimal requirements on process ...
详细信息
ISBN:
(纸本)0769519520
Unreliable failure detectors introduced by Chandra and Toueg are abstract mechanisms that provide information on process failures. On the one hand, failure detectors allow to state the minimal requirements on process failures that allow to solve problems that cannot be solved in purely asynchronous systems. But, on the other hand, they cannot be implemented in such. systems: their implementation requires that the underlying distributed system be enriched with additional assumptions. The usual failure detector implementations rely on additional synchrony assumptions (e.g., partial synchrony). This paper proposes a new look at the implementation of failure detectors and more specifically at Chandra-Toueg's failure detectors. The proposed approach does not rely on synchrony assumptions (e.g., it allows the communication delays to always increase). It is based on a query-response mechanism and assumes that the query/response messages exchanged obey a pattern where the responses from some processes to a query arrive among the (n - f) first ones (n being the total number of processes, f the maximum number of them that can crash, with 1 less than or equal to f < n). When we consider the particular case f = 1, and the implementation of a failure detector of the class denoted lozengeS (the weakest class that allows to solve the consensus problem), the additional assumption the underlying system has to satisfy boils down to a simple channel property, namely, there is eventually a pair of processes (p(i), p(j)) such that the channel connecting them is never the slowest among the channels connecting p(i) or p(j) to the other processes. A probabilistic analysis shows that this requirement is practically met in asynchronous distributed systems.
We consider the leader election problem in a ring whose nodes have possibly nonunique labels. Every node knows a priori its own label and two integers, m and M, which are, respectively, a lower and an upper bound on t...
详细信息
ISBN:
(纸本)1892512459
We consider the leader election problem in a ring whose nodes have possibly nonunique labels. Every node knows a priori its own label and two integers, m and M, which are, respectively, a lower and an upper bound on the (unknown) size n of the ring. The aim is to decide whether leader election is possible and to perform it, if so. We consider both the synchronous and the asynchronous version of the problem and we are interested in message complexity in both cases. For the synchronous version we present an algorithm using 0 (n log n) messages and working in time O(M). Moreover, our algorithm uses O(n) messages when all identifiers are distinct. For the asynchronous version we show an Omega(nM) lower bound on message complexity for this problem, and present an algorithm for it using Omega(nM) messages.
distributed systems are commonly modeled by asynchronous models where no assumption is made about process execution speed. The asynchronous model is preferable to the synchronous one because the model reflects the fac...
详细信息
ISBN:
(纸本)3540404538
distributed systems are commonly modeled by asynchronous models where no assumption is made about process execution speed. The asynchronous model is preferable to the synchronous one because the model reflects the fact that a distributed system consists of computers with different processing speeds. However, the asynchrony of the system makes it difficult to evaluate efficiency (performance) of distributed protocols. This paper defines a class of distributed protocols called linear state-transition protocols, in the state-communication model, and shows that efficiency of such protocols in the asynchronous distributed model can be derived from analysis of their synchronous execution, where all processes are synchronized in the lock-step fashion. This provides an effective method for evaluating efficiency of the linear state-transition protocols in the asynchronous distributed model. The paper also demonstrates the effectiveness of the method by applying it to the self-stabilizing alternator.
The parallel switch is an emerging switch technology,by which we can build a high capacity switching system,such as a terabit switch,from many small switch *** a parallel switch with input queues, the high-speed packe...
详细信息
ISBN:
(纸本)0780378407
The parallel switch is an emerging switch technology,by which we can build a high capacity switching system,such as a terabit switch,from many small switch *** a parallel switch with input queues, the high-speed packets will queue in the input buffer for scheduling,which can highly reduce the control complexity and the internal *** this paper we refer to parallel switch with input queues as Buffered Parallel Switch(BPS). Since the switch fabrics in a BPS are working parallel and independently,we address the open issue of switch fabrics' load-balancing and propose a family of distributed scheduling *** also prove that such load-balancing algorithms can guarantee the delay time of the *** results show the validity and performance of our load-balancing *** considerations on implementing the scheduling algorithms are discussed.
In [5], we have given a straightforward distributed implementation of the Kanellakis-Smolka 'naive' algorithm for reducing labeled transition systems modulo strong bisimulation. The algorithm proceeds by parti...
详细信息
In [5], we have given a straightforward distributed implementation of the Kanellakis-Smolka 'naive' algorithm for reducing labeled transition systems modulo strong bisimulation. The algorithm proceeds by partition refinement, that is by computing increasingly fine-grained partitions of the set of states. In this paper we present an optimized distributed implementation, in which the refinements are no longer entirely recomputed in every iteration, but they are computed incrementally. A second significant improvement is the overlap between communication and computation, that results in a better use of both memory and processing power. We discuss these optimizations and show experimental results.
暂无评论