Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]最新文献

筛选
英文 中文
Efficient distributed routing algorithms for a synchronous circuit-switched hypercube 同步电路交换超立方体的高效分布式路由算法
Mike A. Csoppenszky, Arun Kumar Somani
{"title":"Efficient distributed routing algorithms for a synchronous circuit-switched hypercube","authors":"Mike A. Csoppenszky, Arun Kumar Somani","doi":"10.1109/PCCC.1992.200533","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200533","url":null,"abstract":"The authors discuss the development and performance of a series of distributed routing algorithms for a synchronous circuit-switched hypercube and enhanced hypercube. Several centralized routing algorithms were developed. All the routing algorithms developed were derived from a single high-level concept of how routing can be accomplished in a circuit-switched hypercube. The routing algorithms were derived from the corresponding packet switching routing algorithm. The routing algorithms have different strengths and weaknesses when compared with one another, and these are considered. It is shown that the highest performing algorithm has an extremely low probability of blocking for the enhanced hypercube and the standard hypercube.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121522020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On a class of reliable networks 在一类可靠的网络上
A. Amin
{"title":"On a class of reliable networks","authors":"A. Amin","doi":"10.1109/PCCC.1992.200587","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200587","url":null,"abstract":"A communication network N in which links are subject to failures is typically modeled by a probabilistic graph G in which each edge exists independently with a fixed probability p, 0<p<1. The pair-connected reliability of G is the expected number of connected pairs of vertices in G. The network N when link are overloaded and hence unavailable may be modeled by G with p approximately 0, while N subject to only link failures may be modeled by G with p approximately 1. Therefore, of interest are graphs which maximize the expected number of connected pairs of vertices for both p approximately 0 and p approximately 1. However, it is known that such graphs do not exist. Therefore, the author considers graphs which maximize the expected number of connected pairs of vertices for p approximately 0, among all graphs with specified edge connectivity and hence desired reliability for p approximately 1.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133520328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scheduling real-time computations with extended deadlines 调度实时计算与延长的最后期限
C. Han, K.-J. Lin, P. Tu
{"title":"Scheduling real-time computations with extended deadlines","authors":"C. Han, K.-J. Lin, P. Tu","doi":"10.1109/PCCC.1992.200584","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200584","url":null,"abstract":"In many applications, a real-time job allows part of its computation to be finished after its primary deadline but before its extended deadline. The authors study the scheduling issues for real-time computations with extended deadlines. They call the part of a computation which must be completed before the primary deadline its hard part, and the rest its soft part. Two variations of this problem are studied. In the first model, the system receives a penalty for each late soft part. In the second model, there is an extra computation overhead for each late soft part. For each model, algorithms to produce a feasible schedule are presented.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of local real-time schedulers 本地实时调度器的性能评估
H. Sholl, P. J. Pia, L. Lipsky
{"title":"Performance evaluation of local real-time schedulers","authors":"H. Sholl, P. J. Pia, L. Lipsky","doi":"10.1109/PCCC.1992.200586","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200586","url":null,"abstract":"Through the use of a simulation study, the authors show how the effectiveness of a scheduling algorithm varies depending on the metric of interest and the execution environment under which it runs. They describe the timing requirements of real-time jobs. Three measures of response time controls are described. The model of a scheduling algorithm's execution environment is described, followed by a discussion on the variations in execution environment necessary to investigate adequately the behavior of a given scheduling algorithm. A simulation case study is described. A description of the modeling and simulation of a single processor running M job classes is included. Two scheduling algorithms for controlling response times are described, the results of running three scheduling algorithms under varying execution environments are presented.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130080560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The performance of local and global scheduling strategies in multiprogrammed parallel systems 多程序并行系统中局部和全局调度策略的性能
S. Majumdar
{"title":"The performance of local and global scheduling strategies in multiprogrammed parallel systems","authors":"S. Majumdar","doi":"10.1109/PCCC.1992.200538","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200538","url":null,"abstract":"Based on analytic models this research concentrates on basic issues that are important in the context of processor scheduling in multiprogrammed parallel systems. Local scheduling policies for fork and join jobs are analyzed. Demonstration of the appropriate multiprogramming level, and the computation of the number of processors to be allocated to a job are investigated in the context of global scheduling. The global scheduling approach is static in the sense that a fixed set of processors is allocated to a job and dynamic processor switching from one application to another is not allowed. Important insights into system behavior that are useful in the context of operating systems for parallel systems are obtained as a result of this analysis. A number of basic issues that concern the relationship between job characteristics, system performance, and effective scheduling are discussed.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An approximate analysis of a token ring network with nonpreemptive priority under go-back-to-higher-priority discipline 回归高优先级原则下非抢占优先级令牌环网络的近似分析
M. Ooki, Y. Fukagawa, S. Murakami, S. Yoshida
{"title":"An approximate analysis of a token ring network with nonpreemptive priority under go-back-to-higher-priority discipline","authors":"M. Ooki, Y. Fukagawa, S. Murakami, S. Yoshida","doi":"10.1109/PCCC.1992.200521","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200521","url":null,"abstract":"The authors present an approximate analysis of an asymmetric token ring network with nonpreemptive priority under a new discipline named the go-back-to-higher-priority discipline. This discipline is described and the token ring network is analysed on the basis of the independent hypothesis for the distribution of the cycle time. Then, probabilities for the number of messages at the token's arrival, a mean cycle time, a mean intervisit time of the token and a mean waiting time of messages for each priority level are obtained. To calculate the mean waiting time for a lower priority level, a root of the denominator of the generating function plays an important role. In some numerical examples with simulation results, the mean waiting time for the go-back-to-higher-priority discipline is compared with that for an asymmetric token ring network with nonpreemptive priority under a one-limited discipline.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133867963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital neural network implementation 数字神经网络实现
E. Swartzlander, R. Jones
{"title":"Digital neural network implementation","authors":"E. Swartzlander, R. Jones","doi":"10.1109/PCCC.1992.200512","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200512","url":null,"abstract":"The authors provide a comparison of implementation approaches for digital neural networks. Digital neural networks of large size are feasible if the inputs and outputs are single-bit binary signals. A key component for this application is the parallel counter, which counts the number of inputs that are ONEs. Progress is reported toward the implementation of parallel counters with up to 1022 inputs, as required to realize multilayer neural networks with up to 1000 neurons per layer.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133983480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Steady-state response of shortest-path routing algorithms 最短路径路由算法的稳态响应
W. Zaumen, J. J. Garcia-Luna-Aceves
{"title":"Steady-state response of shortest-path routing algorithms","authors":"W. Zaumen, J. J. Garcia-Luna-Aceves","doi":"10.1109/PCCC.1992.200568","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200568","url":null,"abstract":"The steady-state response of link-state and loop-free distance-vector routing algorithms to multiple changes in the costs of links is investigated. A quantitative comparison of an ideal link-state algorithm similar to the one used in the open shortest path first (OSPF) and in the OSI intradomain routing protocol, and a new loop-free distance-vector algorithm, is made for several computer network topologies. A variety of quantities, including the length of messages and the average number of paths affected by routing loops, are computed as a function of time after a link or node change. Probabilities of various conditions, including the existence of loops, are also obtained as a function of time. The results show that in steady state, a loop-free distance-vector algorithm operates with essentially the same communication overhead as the ideal link state algorithm, and requires substantially fewer CPU cycles. The results also suggest that it may be possible to correlate the performance of the routing algorithms with various parameters that can be used to characterize networks.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The role of propagation in database support for performance-modeling environments 传播在支持性能建模环境的数据库中的作用
H. Ellis, R. Ammar, S. Demurjian
{"title":"The role of propagation in database support for performance-modeling environments","authors":"H. Ellis, R. Ammar, S. Demurjian","doi":"10.1109/PCCC.1992.200556","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200556","url":null,"abstract":"The authors investigate the role of propagation in database support for performance-modeling environments (PMEs) and elaborate on the use of the active data model (ADAM) object-oriented design tool to design performance modeling applications that include propagation. ADAM was used to design a particular performance model including the complex interdependencies between the components of the model, thereby maintaining the consistency of data throughout the model. The analysis contains background on propagation and the performance models of interest, and a discussion of the benefits of propagation for PMEs is discussed by presenting a list of goals for the database support for PMEs and outlining two categories of propagations for performance-modeling data.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sharing a dynamic secret 共享动态秘密
Chinchen Chang, Shin-Jia Hwang
{"title":"Sharing a dynamic secret","authors":"Chinchen Chang, Shin-Jia Hwang","doi":"10.1109/PCCC.1992.200569","DOIUrl":"https://doi.org/10.1109/PCCC.1992.200569","url":null,"abstract":"The authors propose a new finite ideal threshold scheme which provides Shannon perfect secrecy and can be used to handle the changeable master keys system in finite times without affecting any secret shadow. Since the idea was inspired by A. Shamir's (1979) threshold scheme, this threshold scheme is introduced. The definition of the finite ideal threshold scheme is given. The dynamic secret is described. The security analysis of the method is considered.<<ETX>>","PeriodicalId":250212,"journal":{"name":"Eleventh Annual International Phoenix Conference on Computers and Communication [1992 Conference Proceedings]","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133179015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信