Sciweavers

JPDC
2007
97views more  JPDC 2007»
13 years 11 months ago
MPI implementation of parallel subdomain methods for linear and nonlinear convection-diffusion problems
The solution of linear and nonlinear convection–diffusion problems via parallel subdomain methods is considered. MPI implementation of parallel Schwarz alternating methods on di...
Chau Ming, Didier El Baz, Ronan Guivarch, Pierre S...
JPDC
2006
185views more  JPDC 2006»
13 years 11 months ago
Commodity cluster-based parallel processing of hyperspectral imagery
The rapid development of space and computer technologies has made possible to store a large amount of remotely sensed image data, collected from heterogeneous sources. In particul...
Antonio Plaza, David Valencia, Javier Plaza, Pablo...
JPDC
2006
129views more  JPDC 2006»
13 years 11 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
JPDC
2006
133views more  JPDC 2006»
13 years 11 months ago
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems provide efficient mechanisms for resource placement and location. A key distinguishing fe...
Ronaldo A. Ferreira, Suresh Jagannathan, Ananth Gr...
JPDC
2006
87views more  JPDC 2006»
13 years 11 months ago
Distributed mutual exclusion algorithms for grid applications: A hierarchical approach
Marin Bertier, Luciana Bezerra Arantes, Pierre Sen...
JPDC
2006
187views more  JPDC 2006»
13 years 11 months ago
Maximum lifetime data sensing and extraction in energy constrained networked sensor systems
We focus on data gathering problems in energy constrained networked sensor systems. The system operates in rounds where a subset of the sensors generate a certain number of data p...
Bo Hong, Viktor K. Prasanna
JPDC
2006
87views more  JPDC 2006»
13 years 11 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...
JPDC
2006
100views more  JPDC 2006»
13 years 11 months ago
An integrated admission control scheme for the delivery of streaming media
Quality of service (QoS) assurance is a major concern in media-on-demand (MoD) systems. Admission control is one of the most important issues that need to be addressed for QoS ass...
Zhonghang Xia, I-Ling Yen, Donglei Du, Peng Li
JPDC
2006
146views more  JPDC 2006»
13 years 11 months ago
A semi-static approach to mapping dynamic iterative tasks onto heterogeneous computing systems
Minimization of the execution time of an iterative application in a heterogeneous parallel computing environment requires an appropriate mapping scheme for matching and scheduling...
Yu-Kwong Kwok, Anthony A. Maciejewski, Howard Jay ...
JPDC
2006
111views more  JPDC 2006»
13 years 11 months ago
Designing irregular parallel algorithms with mutual exclusion and lock-free protocols
Irregular parallel algorithms pose a significant challenge for achieving high performance because of the difficulty predicting memory access patterns or execution paths. Within an...
Guojing Cong, David A. Bader