Proceedings of 16th International Conference on Distributed Computing Systems最新文献

筛选
英文 中文
Parallel simulation of mesh routing algorithms 网格路由算法的并行仿真
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507913
S. Rahman, C. Das
{"title":"Parallel simulation of mesh routing algorithms","authors":"S. Rahman, C. Das","doi":"10.1109/ICDCS.1996.507913","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507913","url":null,"abstract":"Performance of a network depends primarily on the network topology, switching mechanism, flow control protocol and the underlying routing algorithm. While many routing algorithms have been proposed recently for direct networks, there is no time efficient technique to evaluate and compare all of them. A conventional routing algorithm simulation of a network on a uniprocessor takes unacceptably large computing time. The simulation can be made very time efficient by parallelizing it and running on a parallel test bed. This research is focussed on designing a parallel routing algorithm simulator for n-dimensional mesh connected networks with wormhole switching and virtual channel flow control. The research addresses partitioning mapping, synchronization issues, and implementation of various routing algorithms for 2-D and 3-D mesh architectures. Experimental results show that the parallel simulator can provide significant speedup compared do a uniprocessor environment.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125291240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
General connection rerouting method for various connection-oriented mobile communication networks 用于各种面向连接的移动通信网络的通用连接重路由方法
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507929
Min-ho Song, Yanghee Choi, Chongsang Kim
{"title":"General connection rerouting method for various connection-oriented mobile communication networks","authors":"Min-ho Song, Yanghee Choi, Chongsang Kim","doi":"10.1109/ICDCS.1996.507929","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507929","url":null,"abstract":"To date, various connection rerouting methods for connection-oriented mobile network services have been proposed. The previous methods, however, are limited to specific topologies or environments. In this paper, we propose the CI (Connection Information)-based rerouting widely applicable to various connection-oriented mobile network. This method requires neither a specific topology nor a complex connection, enables fast rerouting, takes a good trade-off between rerouting simplicity and route optimality, and can be extended easily.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"26 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault-tolerant clock synchronization of large multicomputers via multistep interactive convergence 基于多步交互收敛的大型多机容错时钟同步
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507923
Marcelo M. de Azevedo, D. Blough
{"title":"Fault-tolerant clock synchronization of large multicomputers via multistep interactive convergence","authors":"Marcelo M. de Azevedo, D. Blough","doi":"10.1109/ICDCS.1996.507923","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507923","url":null,"abstract":"We present a fault-tolerant algorithm that internally synchronizes clocks in multicomputer systems employing not completely connected networks (NCCNs). The algorithm is referred to as multistep interactive convergence, and is locally implemented in each node by a time sewer process (TSP). The algorithm proceeds in rounds, and bases its operation on a logical mapping of the system's TSPs into an m-dimensional array. A TSP executes m steps per round, each step including a call to an interactive convergence procedure. Clock readings in step i are gathered only from TSPs sharing a row along dimension i of the array, which reduces the number of messages by orders of magnitude over a conventional interactive convergence algorithm. The algorithm can be used in systems of arbitrary topology, and provides the added benefit of increased locality of communication in regular NCCNs. These advantages can be combined with a variety of message staggering mechanisms to maintain network contention at a minimum. We characterize the maximum clock skew maximum clock drift, maximum clock discontinuity, and number of messages produced by the algorithm, and show that it tolerates arbitrary faults. A comparison with other algorithms is provided.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"313 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Monotone response-time derivation for distributed execution of rule-based programs 基于规则的程序分布式执行的单调响应时间派生
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507900
Rwo-Hsi Wang, A. Mok
{"title":"Monotone response-time derivation for distributed execution of rule-based programs","authors":"Rwo-Hsi Wang, A. Mok","doi":"10.1109/ICDCS.1996.507900","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507900","url":null,"abstract":"A key index of the performance of a rule-based program used in real-time monitoring and control is its response time. We first extend the definition of response time of an EQL rule-based program for distributed computation. To reduce the response time through distributed computation, we decompose an EQL program into disjoint modules. We then describe a tool which computes the response-times of finite-state EQL rule-based programs according to the imprecise computation paradigm, i.e., this tool always yields a range which is monotonically tightened as more time is spent in the computation. During the computation, a user can interrupt the analyzer and get both an intermediate result which is a guaranteed bound and a bound-quality factor which quantifies the tightness of this result. Our approach uses fast textual analysis to get initial bounds. It then performs a heuristic search by pruning the state-transition graph to improve the bound quality. A program-decomposition technique for reducing the search effort is also discussed. An analysis example on an EQL program involving 2/sup 59/ states is presented.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"24 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic resource migration for multiparty real-time communication 用于多方实时通信的动态资源迁移
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.508016
R. Bettati, Amit Gupta
{"title":"Dynamic resource migration for multiparty real-time communication","authors":"R. Bettati, Amit Gupta","doi":"10.1109/ICDCS.1996.508016","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.508016","url":null,"abstract":"With long-lived multi-party connections, resource allocation subsystems in distributed real-time systems or communication networks must be aware of dynamically changing network load in order to reduce call-blocking probabilities. We describe a distributed mechanism to dynamically reallocate (\"migrate\") resources without adversely affecting the performance that established connections receive. In addition to allowing systems to dynamically adapt to load, this mechanism allows for distributed relaxation of resources (i.e. the adjustment of overallocation of resources due to conservative assumptions at connection establishment time) for multicast connections. We describe how dynamic resource migration is incorporated in the Tenet Scheme 2 protocols for multiparty real-time communication.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A low-overhead recovery technique using quasi-synchronous checkpointing 一种使用准同步检查点的低开销恢复技术
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507906
D. Manivannan, M. Singhal
{"title":"A low-overhead recovery technique using quasi-synchronous checkpointing","authors":"D. Manivannan, M. Singhal","doi":"10.1109/ICDCS.1996.507906","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507906","url":null,"abstract":"In this paper, we propose a quasi-synchronous checkpointing algorithm and a low-overhead recovery algorithm based on it. The checkpointing algorithm preserves process autonomy by allowing them to take checkpoints asynchronously and uses communication-induced checkpoint coordination for the progression of the recovery line which helps bound rollback propagation during a recovery. Thus, it has the easiness and low overhead of asynchronous checkpointing and the recovery time advantages of synchronous checkpointing. There is no extra message overhead involved during checkpointing and the additional checkpointing overhead is nominal. The algorithm ensures the existence of a recovery line consistent with the latest checkpoint of any process all the time. The recovery algorithm exploits this feature to restore the system to a state consistent with the latest checkpoint of a failed process. The recovery algorithm has no domino effect and a failed process needs only to rollback to its latest checkpoint and request the other processes to roll back to a consistent checkpoint. To avoid domino effect, it uses selective pessimistic message logging at the receiver end. The recovery is asynchronous for single process failure. Neither the recovery algorithm nor the checkpointing algorithm requires the channels to be FIFO. We do not use vector timestamps for determining dependency between checkpoints since vector timestamps generally result in high message overhead during failure-free operation.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 140
Group communication for upgrading distributed programs 用于升级分布式程序的群通信
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507990
H. Higaki, Y. Hirakawa
{"title":"Group communication for upgrading distributed programs","authors":"H. Higaki, Y. Hirakawa","doi":"10.1109/ICDCS.1996.507990","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507990","url":null,"abstract":"Recently, large-scale distributed systems are being developed. Since it is expensive to newly develop the system, it is required to adopt the system in use to the changes of the user requirements and the environments. Therefore, it is essential to discuss how to upgrade the distributed programs. The system cannot be kept highly available by the conventional upgrading methods because multiple processes have to be suspended simultaneously. This paper discusses a new method which allows each process to invoke the upgrading procedure independently of the other processes. The key idea is that multiple versions of processes are allowed to co-exist temporarily. If the multiple versions of processes co-exist, such protocol errors as the unspecified receptions and the communication deadlocks can occur. Each pair of an old-version process and a new-version one is named a process group. The group communication protocol proposed in this paper supports message transmissions among the process groups. Moreover, the protocol errors can be detected and resolved by using checkpointing, timeout and rollback recovery.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132072002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Data mining for path traversal patterns in a web environment web环境中路径遍历模式的数据挖掘
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507986
Ming-Syan Chen, Jong Soo Park, Philip S. Yu
{"title":"Data mining for path traversal patterns in a web environment","authors":"Ming-Syan Chen, Jong Soo Park, Philip S. Yu","doi":"10.1109/ICDCS.1996.507986","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507986","url":null,"abstract":"In this paper, we explore a new data mining capability which involved mining path traversal patterns in a distributed information providing environment like world-wide-web. First, we convert the original sequence of log data into a set of maximal forward references and filter out the effect of some backward references which are mainly made for ease of traveling. Second, we derive algorithms to determine the frequent traversal patterns, i.e., large reference sequences, from the maximal forward references obtained. Two algorithms are devised for determining large reference sequences: one is based on some hashing and pruning techniques, and the other is further improved with the option of determining large reference sequences in batch so as to reduce the number of database scans required. Performance of these two methods is comparatively analyzed.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133347531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An efficient causal ordering algorithm for mobile computing environments 移动计算环境下一种高效的因果排序算法
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.508027
R. Prakash, M. Raynal, M. Singhal
{"title":"An efficient causal ordering algorithm for mobile computing environments","authors":"R. Prakash, M. Raynal, M. Singhal","doi":"10.1109/ICDCS.1996.508027","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.508027","url":null,"abstract":"Causal message ordering is required for several distributed applications. In order to preserve causal ordering, only direct dependency information between messages with respect to the destination process(es) should be sent with each message. By eliminating other kinds of control information from the messages, the communication overheads can be significantly reduced. In this paper we present an algorithm that uses this knowledge to efficiently enforce causal ordering of messages. The proposed algorithm does not require any prior knowledge of the network or communication topology. As computation proceeds, it acquires knowledge of the logical communication topology and is capable of handling dynamically changing multicast communication groups. With regard to communication overheads, the algorithm is optimal for the broadcast communication case. Its energy efficiency and four bandwidth requirement make it suitable for mobile computing systems. We present a strategy that employs the algorithm for causally ordered multicasting of messages in mobile computing environments.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116399566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
Sentries for the execution of concurrent programs 执行并发程序的哨兵
Proceedings of 16th International Conference on Distributed Computing Systems Pub Date : 1996-05-27 DOI: 10.1109/ICDCS.1996.507896
S. Chodrow, M. Gouda
{"title":"Sentries for the execution of concurrent programs","authors":"S. Chodrow, M. Gouda","doi":"10.1109/ICDCS.1996.507896","DOIUrl":"https://doi.org/10.1109/ICDCS.1996.507896","url":null,"abstract":"The sentry of a concurrent program P is a program that executes concurrently with P, periodically takes snapshots of P, and issues a warning if it detects that some snapshot does not satisfy a predefined predicate. The sentry is unique among snapshot-taking systems in its low-overhead. First, the shared storage between the observed program P and the sentry is linear in the number of P variables that are being observed. Second, the observed program P never waits for the sentry. Third, the mutual exclusion between the observed program and the sentry is achieved without using any special hardware or software constructs. In this paper, we present a family of two sentries. One sentry can be used for taking snapshots of scalar variables (and can check whether these snapshots satisfy a given propositional predicate), and the other sentry can be used for taking snapshots of complex variables such as arrays (and can check whether these snapshots satisfy a given first-order predicate). We briefly describe a system prototype for automatically generating sentries for any given concurrent program, and present some encouraging empirical results that we obtained from this prototype.","PeriodicalId":159322,"journal":{"name":"Proceedings of 16th International Conference on Distributed Computing Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1996-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124750062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信