Lásaro J. Camargos, M. Wieloch, F. Pedone, E. Madeira
Distributed transaction processing hinges on enforcing agreement among the involved resource managers on whether to commit or abort transactions (atomicity) and on making their updates permanent (durability). This paper introduces a log service which abstracts these tasks. The service logs commit and abort votes as well as the updates performed by each resource manager. Based on the votes, the log service outputs the transaction's outcome. The service also totally orders non-concurrent transactions and makes the sequence of updates performed by each resource manager available as a means to consistently recover resource managers without relying on their local state. Besides the specification, we overview two highly available implementations of this service and present an experimental performance evaluation.
{"title":"A Highly Available Log Service for Transaction Termination","authors":"Lásaro J. Camargos, M. Wieloch, F. Pedone, E. Madeira","doi":"10.1109/ISPDC.2008.11","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.11","url":null,"abstract":"Distributed transaction processing hinges on enforcing agreement among the involved resource managers on whether to commit or abort transactions (atomicity) and on making their updates permanent (durability). This paper introduces a log service which abstracts these tasks. The service logs commit and abort votes as well as the updates performed by each resource manager. Based on the votes, the log service outputs the transaction's outcome. The service also totally orders non-concurrent transactions and makes the sequence of updates performed by each resource manager available as a means to consistently recover resource managers without relying on their local state. Besides the specification, we overview two highly available implementations of this service and present an experimental performance evaluation.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131054808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The developers of distributed algorithms are faced with two opposing forces. One is to design generic algorithms that are reusable in a large number of applications. Efficiency considerations, on the other hand, force the algorithms to be customized to specific operational contexts. This problem is often attacked by simply re-implementing all or large portions of an algorithm. This paper proposes InDiGO, an infrastructure which allows design of generic but customizable algorithms and provides tools to customize such algorithms for specific applications. InDiGO provides the following capabilities: (a) Tools to generate intermediate representations of an application which can be leveraged for analysis, (b) Mechanisms to allow developers to design customizable algorithms by exposing design knowledge in terms of configurable options, and (c) An optimization engine to analyze an application to derive the information necessary optimize the algorithms. We perform three types of optimizations: static, dynamic and physical topology-based optimization. We present experimental results to demonstrate the advantages of our infrastructure.
{"title":"InDiGO: An Infrastructure for Optimization of Distributed Algorithms","authors":"Valeriy A. Kolesnikov, Gurdip Singh","doi":"10.1109/ISPDC.2008.43","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.43","url":null,"abstract":"The developers of distributed algorithms are faced with two opposing forces. One is to design generic algorithms that are reusable in a large number of applications. Efficiency considerations, on the other hand, force the algorithms to be customized to specific operational contexts. This problem is often attacked by simply re-implementing all or large portions of an algorithm. This paper proposes InDiGO, an infrastructure which allows design of generic but customizable algorithms and provides tools to customize such algorithms for specific applications. InDiGO provides the following capabilities: (a) Tools to generate intermediate representations of an application which can be leveraged for analysis, (b) Mechanisms to allow developers to design customizable algorithms by exposing design knowledge in terms of configurable options, and (c) An optimization engine to analyze an application to derive the information necessary optimize the algorithms. We perform three types of optimizations: static, dynamic and physical topology-based optimization. We present experimental results to demonstrate the advantages of our infrastructure.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122126604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Identifying and inferring performances of a network topology is a well known problem. Achieving this by using only end-to-end measurements at the application level is a method known as network tomography. When the topology produced reflects capacities of sets of links with respect to a metric, the topology is called a Metric-Induced Network Topology (MINT). Tomography producing MINT has been widely used in order to predict performances of communications between clients and server. Nowadays grids connect up to thousands communicating resources that may interact in a partially or totally coordinated way. Consequently, applications running upon this kind of platform often involve massively concurrent bulk data transfers. This implies that the client/server model is no longer valid. In this paper, we introduce new algorithms that reconstruct a novel representation of the knowledge inferred from the network which is able to deal with multiple sources/multiple destinations transfers.
{"title":"Algorithms for Network Topology Discovery using End-to-End Measurements","authors":"Laurent Bobelin, T. Muntean","doi":"10.1109/ISPDC.2008.56","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.56","url":null,"abstract":"Identifying and inferring performances of a network topology is a well known problem. Achieving this by using only end-to-end measurements at the application level is a method known as network tomography. When the topology produced reflects capacities of sets of links with respect to a metric, the topology is called a Metric-Induced Network Topology (MINT). Tomography producing MINT has been widely used in order to predict performances of communications between clients and server. Nowadays grids connect up to thousands communicating resources that may interact in a partially or totally coordinated way. Consequently, applications running upon this kind of platform often involve massively concurrent bulk data transfers. This implies that the client/server model is no longer valid. In this paper, we introduce new algorithms that reconstruct a novel representation of the knowledge inferred from the network which is able to deal with multiple sources/multiple destinations transfers.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122884318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper gives an overview of LOTOS-based semantics for compositional UML statecharts. The purpose of this work is to develop a description of a UML statechart model using one of the formal description language - LOTOS.Our approach concentrate on two aspects of the statechart model: concurrency and compositionality. We are using a full LOTOS version to define micro-step semantics which allows to implement cross-state boundaries transitions. Based on the translation function we are able to use a formal statechart model to check the equivalence relations and other model checking techniques.
{"title":"UML Statecharts Compositional Semantics in LOTOS","authors":"Rafał Mrówka, T. Szmuc","doi":"10.1109/ISPDC.2008.60","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.60","url":null,"abstract":"This paper gives an overview of LOTOS-based semantics for compositional UML statecharts. The purpose of this work is to develop a description of a UML statechart model using one of the formal description language - LOTOS.Our approach concentrate on two aspects of the statechart model: concurrency and compositionality. We are using a full LOTOS version to define micro-step semantics which allows to implement cross-state boundaries transitions. Based on the translation function we are able to use a formal statechart model to check the equivalence relations and other model checking techniques.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123308953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increasing power of computation of modern processors rely on the increasing number of cores per chip. The challenge of software developers is to keep this power with the legacy code. Although commercial and non commercial libraries are improving their codes step by step, there exits probably insurmountable scalability issues for standard programming models due to the fact that using locks to implement synchronisation is inherently a bottleneck. We propose an implementation of the divide and conquer algorithm to compute the eigenpairs of symmetric tridiagonal matrices on multicore systems. We take advantage of the natural parallelism of the method by using pthreads. We avoided as much as possible the negative impact of synchronisation in the performance by overlapping operations of different classes. Furthermore, the unevenly workload distribution of the computational cost of the elemental tasks yields in a speedup even larger than expected.
{"title":"A Threaded Divide and Conquer Symmetric Tridiagonal Eigensolver on Multicore Systems","authors":"A. Vidal, M. Boratto, P. Alonso","doi":"10.1109/ISPDC.2008.44","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.44","url":null,"abstract":"The increasing power of computation of modern processors rely on the increasing number of cores per chip. The challenge of software developers is to keep this power with the legacy code. Although commercial and non commercial libraries are improving their codes step by step, there exits probably insurmountable scalability issues for standard programming models due to the fact that using locks to implement synchronisation is inherently a bottleneck. We propose an implementation of the divide and conquer algorithm to compute the eigenpairs of symmetric tridiagonal matrices on multicore systems. We take advantage of the natural parallelism of the method by using pthreads. We avoided as much as possible the negative impact of synchronisation in the performance by overlapping operations of different classes. Furthermore, the unevenly workload distribution of the computational cost of the elemental tasks yields in a speedup even larger than expected.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A new parallel algorithm for finding the frequent itemsets in databases is presented. It differs fundamentally of well known Apriori algorithm, where at the beginning of every step, the dimension of the new frequent itemsets increases by 1 . In our algorithm the frequent itemsets are determined by progressively enlarging the interval which the individual items appertain, i.e. if at the k-th step the new candidates are from [i, i+k] intervals, i=1, 2,..., n-k, at the next step, k+1, the new candidates will belong to [i, i+k+1] intervals, i=1, 2,..., n-k-1. The frequent individual items are identified by their index. The basic idea is that the new frequent itemsets with individual items from the interval [i, j], simultaneously contain the items i and j. The frequent itemsets are built by sharing the work between n processors. Hereby, the processor Pi computes, step by step, the sets Fi,j of the frequent itemsets with individual items from the intervals [i, j], j=i,..., n. In order to compute the set Fi,j, the processing unit Pi uses Fi,j-1 obtained in the previous step and Fi+1,j received from the processor Pi+1. The main advantage of our parallel algorithm is that it uses a communication pattern known before algorithm start, which allows mapping communication to hardware. Another major advantage is that the set of the transactions can be distributed to processors prior to beginning. This is possible because a processor Pi has to compute Fi,j, j=i,..., n and therefore only the transactions containing the frequent item i are needed.
提出了一种新的查找数据库频繁项集的并行算法。它与众所周知的Apriori算法有根本的不同,在每一步开始时,新的频繁项集的维数增加1。在我们的算法中,频繁项集是通过逐步扩大单个项所属的区间来确定的,即如果在第k步,新的候选项来自[i, i+k]个区间,则i= 1,2,…, n-k,在下一步,k+1,新的候选将属于[i, i+k+1]区间,i= 1,2,…, n - k - 1。频繁出现的单个项目由它们的索引标识。其基本思想是新的频繁项集包含区间[i, j]中的单个项,同时包含项i和项j。频繁项集通过在n个处理器之间共享工作来构建。由此,处理器Pi逐级计算区间[i, j], j=i,…中单个项目的频繁项集的集合Fi,j。, n。为了计算集合Fi,j,处理单元Pi使用上一步得到的Fi,j-1和处理器Pi+1接收到的Fi+1,j。我们的并行算法的主要优点是,它使用在算法开始之前就已知的通信模式,这允许将通信映射到硬件。另一个主要优点是,事务集可以在开始之前分发给处理器。这是可能的,因为处理器Pi必须计算Fi,j, j=i,…, n,因此只需要包含频繁项I的事务。
{"title":"A New Parallel Algorithm for the Frequent Itemset Mining Problem","authors":"M. Craus","doi":"10.1109/ISPDC.2008.45","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.45","url":null,"abstract":"A new parallel algorithm for finding the frequent itemsets in databases is presented. It differs fundamentally of well known Apriori algorithm, where at the beginning of every step, the dimension of the new frequent itemsets increases by 1 . In our algorithm the frequent itemsets are determined by progressively enlarging the interval which the individual items appertain, i.e. if at the k-th step the new candidates are from [i, i+k] intervals, i=1, 2,..., n-k, at the next step, k+1, the new candidates will belong to [i, i+k+1] intervals, i=1, 2,..., n-k-1. The frequent individual items are identified by their index. The basic idea is that the new frequent itemsets with individual items from the interval [i, j], simultaneously contain the items i and j. The frequent itemsets are built by sharing the work between n processors. Hereby, the processor Pi computes, step by step, the sets Fi,j of the frequent itemsets with individual items from the intervals [i, j], j=i,..., n. In order to compute the set Fi,j, the processing unit Pi uses Fi,j-1 obtained in the previous step and Fi+1,j received from the processor Pi+1. The main advantage of our parallel algorithm is that it uses a communication pattern known before algorithm start, which allows mapping communication to hardware. Another major advantage is that the set of the transactions can be distributed to processors prior to beginning. This is possible because a processor Pi has to compute Fi,j, j=i,..., n and therefore only the transactions containing the frequent item i are needed.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133616956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Summary form only given. As number and diversity of data, information and resources increase importance of usage of knowledge for their accessing and reuse grows significantly. One of the most useful approaches is based on semantic description of elementary data and pieces of information as well as on relations between them, therefore resulting in ontological approach. Semantics is starting to be used in wider scope than ever, especially for accessing distributed resources. This field is well represented by the Semantic Web, where WWW content can be expressed also in a format that can be read and used by automated tools, thus permitting people and machines to find, share and integrate information more easily. Semantic description of services and user requests can also be used in (semi-)automatic construction of distributed/Grid applications, often in a form of workflows. In order to effectively manage ontologies on the level higher than the local one, e.g., using Virtual Organization approach some sort of knowledge base must be provided.
{"title":"Semantic Approach to Capability and Capacity Computing","authors":"J. Kitowski","doi":"10.1109/ISPDC.2008.67","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.67","url":null,"abstract":"Summary form only given. As number and diversity of data, information and resources increase importance of usage of knowledge for their accessing and reuse grows significantly. One of the most useful approaches is based on semantic description of elementary data and pieces of information as well as on relations between them, therefore resulting in ontological approach. Semantics is starting to be used in wider scope than ever, especially for accessing distributed resources. This field is well represented by the Semantic Web, where WWW content can be expressed also in a format that can be read and used by automated tools, thus permitting people and machines to find, share and integrate information more easily. Semantic description of services and user requests can also be used in (semi-)automatic construction of distributed/Grid applications, often in a form of workflows. In order to effectively manage ontologies on the level higher than the local one, e.g., using Virtual Organization approach some sort of knowledge base must be provided.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128301295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new token-based mutual exclusion algorithm for directed graph topology, with or without cycles. In one of our earlier works, we have introduced a token based algorithm assuming an inverted tree topology. Such a stable, hierarchical topology is quite unrealistic for mobile networks due to frequent link failures and node mobility. The proposed solution overcomes this. Besides maintaining the correctness in terms of liveness and safety, the proposed algorithm ensures fairness in allocating the token amongst the competing processes. The algorithm offers solution paths even in presence of link failures.
{"title":"A Link-failure Resilient Token based Mutual Exclusion Algorithm for Directed Graph Topology","authors":"Sukhendu Kanrar, S. Choudhury, N. Chaki","doi":"10.1109/ISPDC.2008.17","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.17","url":null,"abstract":"This paper proposes a new token-based mutual exclusion algorithm for directed graph topology, with or without cycles. In one of our earlier works, we have introduced a token based algorithm assuming an inverted tree topology. Such a stable, hierarchical topology is quite unrealistic for mobile networks due to frequent link failures and node mobility. The proposed solution overcomes this. Besides maintaining the correctness in terms of liveness and safety, the proposed algorithm ensures fairness in allocating the token amongst the competing processes. The algorithm offers solution paths even in presence of link failures.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132884093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Urban settings are host of diverse networking technologies, from 3G and wired broadband to Wi-Fi, WiMAX, Bluetooth and, more recently, sensor networks. Potentially, these co-existing networks can provide rich inputs to mobile applications that are context aware. To date, the vast majority of context-aware mobile applications are specialized, e.g. healthcare and tourism, and they lack generality and adaptability. It is therefore essential to use a context model that will match the requirements of a large range of future urban networks applications. The question addressed by this paper is to propose an appropriate context model that is general enough to be effective for urban settings, the challenge being to provide the context-aware service to a wide variety of mobile applications across all networks. This paper presents an analysis of existing models, introduces the O+L model (ontologies plus logic) adopted by the authors, the original service architecture that supports the model and its qualitative evaluation.
{"title":"Context Modeling for Urban Mobile Applications","authors":"Romain Williot, D. Grigoras","doi":"10.1109/ISPDC.2008.22","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.22","url":null,"abstract":"Urban settings are host of diverse networking technologies, from 3G and wired broadband to Wi-Fi, WiMAX, Bluetooth and, more recently, sensor networks. Potentially, these co-existing networks can provide rich inputs to mobile applications that are context aware. To date, the vast majority of context-aware mobile applications are specialized, e.g. healthcare and tourism, and they lack generality and adaptability. It is therefore essential to use a context model that will match the requirements of a large range of future urban networks applications. The question addressed by this paper is to propose an appropriate context model that is general enough to be effective for urban settings, the challenge being to provide the context-aware service to a wide variety of mobile applications across all networks. This paper presents an analysis of existing models, introduces the O+L model (ontologies plus logic) adopted by the authors, the original service architecture that supports the model and its qualitative evaluation.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114454503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When running large parallel applications with demands for resources that exceed the capacity the local computing site offers, the deployment in a distributed grid environment may help to satisfy these demands. However, since such an environment is a heterogeneous system by nature, there are some drawbacks that, if not taken into account, are limiting its applicability.First of all, one has to apply a meta-computing or Grid-enabled message-passing library in order to have the ability to route messages to remote sites as well as still being able to exploit fast site-local network facilities.Then, because the inter-site communication usually constitutes the system's bottleneck, appropriate quality of service parameters should be provided and policed for those connections during the application's execution. And finally, the parallel runtime environment of the distributed application should offer service interfaces in order to enable its interaction with Grid middleware. In this paper, we present a new library called ISI whose functionalities meet those requirements in terms of a session layer to be integrated into grid-enabled message-passing implementations.
{"title":"Design and Implementation of a Service-integrated Session Layer for Efficient Message Passing in Grid Computing Environments","authors":"Carsten Clauss, Stefan Lankes, T. Bemmerl","doi":"10.1109/ISPDC.2008.41","DOIUrl":"https://doi.org/10.1109/ISPDC.2008.41","url":null,"abstract":"When running large parallel applications with demands for resources that exceed the capacity the local computing site offers, the deployment in a distributed grid environment may help to satisfy these demands. However, since such an environment is a heterogeneous system by nature, there are some drawbacks that, if not taken into account, are limiting its applicability.First of all, one has to apply a meta-computing or Grid-enabled message-passing library in order to have the ability to route messages to remote sites as well as still being able to exploit fast site-local network facilities.Then, because the inter-site communication usually constitutes the system's bottleneck, appropriate quality of service parameters should be provided and policed for those connections during the application's execution. And finally, the parallel runtime environment of the distributed application should offer service interfaces in order to enable its interaction with Grid middleware. In this paper, we present a new library called ISI whose functionalities meet those requirements in terms of a session layer to be integrated into grid-enabled message-passing implementations.","PeriodicalId":125975,"journal":{"name":"2008 International Symposium on Parallel and Distributed Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122680528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}