首页 > 最新文献

22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)最新文献

英文 中文
Web-Based Support Coordination by Using WIDIS - Case Study of Chuesu-oki Earthquake in 2007 基于WIDIS的网络支持协调——以2007年川崎地震为例
N. Sawano, Tsuyoshi Hoshikawa, Takayuki Obata
One of the major earthquakes named "Chuesu-oki Earthquake" was happened in Niigara Prefecture, central part of Japan on July 16, 2007. Since four days after the earthquake, our researchers' team has joined volunteer coordination activities as so called "information volunteer" by using WIDIS (Wide area Disaster Information Sharing system) which is a kind of Web based geographical information system. Our activity includes 1) making daily reports on the activity and disclosing information by using WIDIS (http://saigai.jp/), 2) building and updating database for affected houses, 3) coordination activities of volunteers to the disaster victims. WIDIS has been actually used for all aspects of these activities. Through these experiences, it became clear that G- WIDIS can be effectively used to coordinate disaster relevant information between each volunteer centre which will be placed in afflicted cities and towns.
2007年7月16日,日本中部的新加拉县发生了一次大地震,名为“秋树地震”。从地震发生的第4天开始,我们的研究团队就利用一种基于Web的地理信息系统WIDIS (Wide area Disaster information Sharing system,广域灾害信息共享系统),以“信息志愿者”的身份参与志愿者协调活动。我们的活动包括:1)通过WIDIS (http://saigai.jp/)对活动进行每日报告和信息披露;2)建立和更新受灾房屋数据库;3)协调志愿者的救灾活动。实际上,WIDIS已用于这些活动的所有方面。通过这些经验,很明显,G- WIDIS可以有效地用于在受灾城镇的每个志愿服务中心之间协调与灾害有关的信息。
{"title":"Web-Based Support Coordination by Using WIDIS - Case Study of Chuesu-oki Earthquake in 2007","authors":"N. Sawano, Tsuyoshi Hoshikawa, Takayuki Obata","doi":"10.1109/WAINA.2008.141","DOIUrl":"https://doi.org/10.1109/WAINA.2008.141","url":null,"abstract":"One of the major earthquakes named \"Chuesu-oki Earthquake\" was happened in Niigara Prefecture, central part of Japan on July 16, 2007. Since four days after the earthquake, our researchers' team has joined volunteer coordination activities as so called \"information volunteer\" by using WIDIS (Wide area Disaster Information Sharing system) which is a kind of Web based geographical information system. Our activity includes 1) making daily reports on the activity and disclosing information by using WIDIS (http://saigai.jp/), 2) building and updating database for affected houses, 3) coordination activities of volunteers to the disaster victims. WIDIS has been actually used for all aspects of these activities. Through these experiences, it became clear that G- WIDIS can be effectively used to coordinate disaster relevant information between each volunteer centre which will be placed in afflicted cities and towns.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PLEXCast: Peer-to-Peer Flexble Broadcast System PLEXCast:点对点灵活广播系统
Yoshitaka Yokokawa, K. Hashimoto, Y. Shibata
There are a lot of studies concerned with video streaming methods based on peer-to-peer network in order to realize efficient video services. However, a lot of these are not considering user's real network environment, and these are not enough about efficiency in the use of network resources and device resources. On the other hand, the strategy of an appropriate quality streaming is needed in order to deal with the user's various quality demands. In this paper, we propose PLEXCast system: peer-to-peer video streaming system that deal with each user's multiple network environments, quality demand, and dynamic change of delivery network. PLEXCast system has following functions: 1) IP unicast/multicast selecting protocol with user's network environment, 2) contents transcoding function with user's quality demand, 3) sub-streaming function for assuring service continuity.
为了实现高效的视频服务,人们对基于点对点网络的视频流传输方法进行了大量的研究。然而,这些都没有考虑到用户的真实网络环境,在网络资源和设备资源的使用效率方面做得不够。另一方面,为了满足用户的各种质量需求,需要适当的质量流策略。在本文中,我们提出了PLEXCast系统:一个点对点视频流系统,可以处理每个用户的多个网络环境、质量需求和交付网络的动态变化。PLEXCast系统具有以下功能:1)根据用户的网络环境选择IP单播/组播协议;2)根据用户的质量需求进行内容转码功能;3)保证业务连续性的子流功能。
{"title":"PLEXCast: Peer-to-Peer Flexble Broadcast System","authors":"Yoshitaka Yokokawa, K. Hashimoto, Y. Shibata","doi":"10.1109/WAINA.2008.54","DOIUrl":"https://doi.org/10.1109/WAINA.2008.54","url":null,"abstract":"There are a lot of studies concerned with video streaming methods based on peer-to-peer network in order to realize efficient video services. However, a lot of these are not considering user's real network environment, and these are not enough about efficiency in the use of network resources and device resources. On the other hand, the strategy of an appropriate quality streaming is needed in order to deal with the user's various quality demands. In this paper, we propose PLEXCast system: peer-to-peer video streaming system that deal with each user's multiple network environments, quality demand, and dynamic change of delivery network. PLEXCast system has following functions: 1) IP unicast/multicast selecting protocol with user's network environment, 2) contents transcoding function with user's quality demand, 3) sub-streaming function for assuring service continuity.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Management of Semi-Persistent Data for the Evolving Web 不断发展的Web中半持久数据的有效管理
K. Cheng, X. You, Yanchun Zhang
The Web is an information repository that grows and evolves fast. Traditional data management systems are based on a persistence model that are not suited for management of Web data. In this paper, we propose a semi-persistence model to capture the evolving nature of the Web. By semi-persistence, we mean data with relaxed persistence requirement where obsolete data may be moved to somewhere or removed implicitly and autonomously. In a semi-persistent data management system, data and the associated statistics have to be maintained efficiently to support trend-report queries and age estimation. We propose a space-efficient data structure, called moving bloom filters (MBF) to maintain time-sensitive statistics of underlying data. The preliminary experiments show that the optimized MBF achieves considerable improvement on space usage while maintaining the same precise estimation of frequency statistics.
Web是一个快速增长和发展的信息存储库。传统的数据管理系统基于持久性模型,不适合管理Web数据。在本文中,我们提出了一个半持久化模型来捕捉Web不断发展的本质。通过半持久性,我们指的是具有宽松持久性要求的数据,其中过时的数据可以隐式和自主地移动到某个地方或删除。在半持久性数据管理系统中,必须有效地维护数据和相关统计信息,以支持趋势报告查询和年龄估计。我们提出了一种空间高效的数据结构,称为移动布隆过滤器(MBF),以维护底层数据的时间敏感统计。初步实验表明,优化后的MBF在保持频率统计估计精度不变的情况下,在空间利用率上有了较大的提高。
{"title":"Efficient Management of Semi-Persistent Data for the Evolving Web","authors":"K. Cheng, X. You, Yanchun Zhang","doi":"10.1109/WAINA.2008.192","DOIUrl":"https://doi.org/10.1109/WAINA.2008.192","url":null,"abstract":"The Web is an information repository that grows and evolves fast. Traditional data management systems are based on a persistence model that are not suited for management of Web data. In this paper, we propose a semi-persistence model to capture the evolving nature of the Web. By semi-persistence, we mean data with relaxed persistence requirement where obsolete data may be moved to somewhere or removed implicitly and autonomously. In a semi-persistent data management system, data and the associated statistics have to be maintained efficiently to support trend-report queries and age estimation. We propose a space-efficient data structure, called moving bloom filters (MBF) to maintain time-sensitive statistics of underlying data. The preliminary experiments show that the optimized MBF achieves considerable improvement on space usage while maintaining the same precise estimation of frequency statistics.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Evaluation: A Practical Simulation-Based Method for Accurate Performance Evaluation of Routing Protocols in Wireless Sensor Networks 特殊评估:一种基于仿真的无线传感器网络路由协议精确性能评估方法
E. Ahvar, M. Fathy
Some simulators were designed for wireless sensor networks. The main goal of these simulators is to provide a framework to closely model and simulate various sensor networks scenarios. Two important factors for accurate evaluation are simulator and method of simulation. In this paper, we don't want to produce a new simulator for sensor networks. We will show how to use current simulators for getting accurate results. On the other hand, we will talk about the role of evaluation methods in simulation results and show current evaluation method; analysis of routing protocols based on results of finite states of network, isn't an exact evaluation for using in a special application for sensor networks. Then we offer a method for accurate and practical evaluation of routing protocols in sensor networks. We name it special evaluation method and compare it with traditional evaluation method. Then, we show that our offer method has more accurate results than traditional evaluation method. Finally, we find reasons of result difference between two methods.
针对无线传感器网络设计了仿真器。这些模拟器的主要目标是提供一个框架来密切建模和模拟各种传感器网络场景。准确评估的两个重要因素是模拟器和仿真方法。在本文中,我们不想为传感器网络制作一个新的模拟器。我们将展示如何使用电流模拟器来获得准确的结果。另一方面,我们将讨论评估方法在仿真结果中的作用,并展示当前的评估方法;基于网络有限状态的结果来分析路由协议,对于传感器网络的特殊应用来说并不是一个准确的评价。然后,我们提供了一种准确实用的传感器网络路由协议评估方法。将其命名为特殊评价方法,并与传统评价方法进行比较。结果表明,本文提出的报价方法比传统的评估方法具有更高的准确性。最后,分析了两种方法结果差异的原因。
{"title":"Special Evaluation: A Practical Simulation-Based Method for Accurate Performance Evaluation of Routing Protocols in Wireless Sensor Networks","authors":"E. Ahvar, M. Fathy","doi":"10.1109/WAINA.2008.235","DOIUrl":"https://doi.org/10.1109/WAINA.2008.235","url":null,"abstract":"Some simulators were designed for wireless sensor networks. The main goal of these simulators is to provide a framework to closely model and simulate various sensor networks scenarios. Two important factors for accurate evaluation are simulator and method of simulation. In this paper, we don't want to produce a new simulator for sensor networks. We will show how to use current simulators for getting accurate results. On the other hand, we will talk about the role of evaluation methods in simulation results and show current evaluation method; analysis of routing protocols based on results of finite states of network, isn't an exact evaluation for using in a special application for sensor networks. Then we offer a method for accurate and practical evaluation of routing protocols in sensor networks. We name it special evaluation method and compare it with traditional evaluation method. Then, we show that our offer method has more accurate results than traditional evaluation method. Finally, we find reasons of result difference between two methods.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"307 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks 移动Ad Hoc网络中集成入侵检测和批量密钥交换的动态群通信系统性能分析
Jin-Hee Cho, I. Chen, Phu-Gui Feng
We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and the best batch rekey interval under which the system lifetime (mean time to security failure) is maximized while satisfying performance requirements. We develop a mathematical model based on stochastic Petri net (SPN) to analyze tradeoffs between security and performance properties, when given a set of parameter values characterizing operational and environmental conditions of a GCS instrumented with intrusion detection tightly coupled with batch rekeying. We compare our design with a baseline system using intrusion detection integrated with individual rekeying to demonstrate the effectiveness.
我们研究了移动自组织网络中安全组通信系统(GCSs)的性能特征,该网络采用入侵检测技术来处理内部攻击,并与处理外部攻击的重密钥技术紧密结合。目标是确定最佳设置,包括最佳入侵检测间隔和最佳批处理重键间隔,在此间隔下,系统生命周期(到安全故障的平均时间)最大化,同时满足性能要求。我们开发了一个基于随机Petri网(SPN)的数学模型来分析安全性和性能之间的权衡,当给定一组参数值来表征具有入侵检测和批量密钥更新的GCS仪器的操作和环境条件时。我们将我们的设计与使用集成了个人密钥更新的入侵检测的基线系统进行比较,以证明其有效性。
{"title":"Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks","authors":"Jin-Hee Cho, I. Chen, Phu-Gui Feng","doi":"10.1109/WAINA.2008.140","DOIUrl":"https://doi.org/10.1109/WAINA.2008.140","url":null,"abstract":"We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider attacks. The objective is to identify optimal settings including the best intrusion detection interval and the best batch rekey interval under which the system lifetime (mean time to security failure) is maximized while satisfying performance requirements. We develop a mathematical model based on stochastic Petri net (SPN) to analyze tradeoffs between security and performance properties, when given a set of parameter values characterizing operational and environmental conditions of a GCS instrumented with intrusion detection tightly coupled with batch rekeying. We compare our design with a baseline system using intrusion detection integrated with individual rekeying to demonstrate the effectiveness.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125040331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Neighbor-Aware Clusterhead for SNET SNET的邻居感知簇头
T. Sheltami
A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. In this paper, we propose a novel cluster-based infrastructure creation protocol, namely: the neighbor-aware clusterhead (NAC). NAC establishes a dynamic wireless mobile infrastructure. We study the characteristics and performance of the NAC protocol by means of simulation. In NAC protocol nodes are synchronized with their clusterheads and are allowed to go sleep mode in order to conserve their energy without degrading the performance of the network. The network is divided into clusters managed by a clusterhead. The simulation results show that NAC protocol has a good potential to be a good candidate protocol for SNET.
无线移动传感器网络是无线移动主机的集合,形成任意和随机改变其位置的节点,并且在没有任何集中管理或标准支持服务的帮助下进行通信。节点分为传感器节点和路由器。有些节点既充当传感器又充当路由器。本文提出了一种新的基于集群的基础设施创建协议,即:邻居感知集群头(NAC)。NAC建立了一个动态的无线移动基础设施。通过仿真研究了NAC协议的特性和性能。在NAC协议中,节点与其簇头同步,并允许进入休眠模式,以便在不降低网络性能的情况下节省能量。网络被划分为由一个簇头管理的集群。仿真结果表明,NAC协议有很好的潜力成为SNET的候选协议。
{"title":"Neighbor-Aware Clusterhead for SNET","authors":"T. Sheltami","doi":"10.1109/WAINA.2008.219","DOIUrl":"https://doi.org/10.1109/WAINA.2008.219","url":null,"abstract":"A wireless mobile sensor network is a collection of wireless mobile hosts forming nodes that are arbitrarily and randomly changing their locations and communicating without the aid of any centralized administration or standard support services. Nodes are classified as sensor nodes and router. Some nodes act both as sensors and routers. In this paper, we propose a novel cluster-based infrastructure creation protocol, namely: the neighbor-aware clusterhead (NAC). NAC establishes a dynamic wireless mobile infrastructure. We study the characteristics and performance of the NAC protocol by means of simulation. In NAC protocol nodes are synchronized with their clusterheads and are allowed to go sleep mode in order to conserve their energy without degrading the performance of the network. The network is divided into clusters managed by a clusterhead. The simulation results show that NAC protocol has a good potential to be a good candidate protocol for SNET.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122942404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey of RFID Authentication Protocols RFID认证协议综述
Yawer Yousuf, V. Potdar
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP.
RFID是一种小型无线设备,可用于识别物体和人。在过去的几年里,他们的接受程度有所提高,预计还会进一步提高。由于生产成本的降低,RFID设备正在大量部署在供应链中(沃尔玛等)。在本文中,我们对文献中提出的各种RFID认证协议进行了全面的调查,并将其分为不同的类别。然后我们研究了具有极简技术的RFID认证协议,即EMAP, LMAP和M2MAP。
{"title":"A Survey of RFID Authentication Protocols","authors":"Yawer Yousuf, V. Potdar","doi":"10.1109/WAINA.2008.214","DOIUrl":"https://doi.org/10.1109/WAINA.2008.214","url":null,"abstract":"RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study RFID authentication protocols having minimalist technique namely EMAP, LMAP and M2MAP.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Probabilistic Relational Database Applications for Biomedical Informatics 概率关系数据库在生物医学信息学中的应用
Ping-Tsai Chung, Hsin-Hua Hsiao
In the information age, information is usually communicated and exchanged with heterogeneous databases in a distributed internetworking environment. When multiple heterogeneous databases show different values for the same data item, its actual value is not known with certainty. Probabilistic relational databases have extended from the relational database model by incorporating probability measures to capture the data uncertainty associated with data items. In this paper, we apply the probabilistic relational database techniques to the area of biomedical informatics. We address the issue of database interoperability by using a data warehousing approach to resolve mismatched domains and to integrate information from different data sources. We then develop query processing strategies to effectively evaluate and answer queries from the consolidated database.
在信息时代,信息通常是在分布式互联网络环境下与异构数据库进行通信和交换的。当多个异构数据库对同一数据项显示不同的值时,其实际值是不确定的。概率关系数据库通过合并概率度量来捕获与数据项相关的数据不确定性,从而扩展了关系数据库模型。本文将概率关系数据库技术应用于生物医学信息学领域。我们通过使用数据仓库方法来解决不匹配的域和集成来自不同数据源的信息来解决数据库互操作性问题。然后,我们开发查询处理策略,以有效地评估和回答来自统一数据库的查询。
{"title":"Probabilistic Relational Database Applications for Biomedical Informatics","authors":"Ping-Tsai Chung, Hsin-Hua Hsiao","doi":"10.1109/WAINA.2008.280","DOIUrl":"https://doi.org/10.1109/WAINA.2008.280","url":null,"abstract":"In the information age, information is usually communicated and exchanged with heterogeneous databases in a distributed internetworking environment. When multiple heterogeneous databases show different values for the same data item, its actual value is not known with certainty. Probabilistic relational databases have extended from the relational database model by incorporating probability measures to capture the data uncertainty associated with data items. In this paper, we apply the probabilistic relational database techniques to the area of biomedical informatics. We address the issue of database interoperability by using a data warehousing approach to resolve mismatched domains and to integrate information from different data sources. We then develop query processing strategies to effectively evaluate and answer queries from the consolidated database.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123673488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream Processor 在想象流处理器上选择最佳条带大小的有效编译方法
Jing Du, Canqun Yang, F. Ao, Xuejun Yang
Strip-mining technique is critical for improving performance of large-scale scientific applications on Imagine. In this paper, we present a model-guided strip size selection approach (OSS) for finding the optimal strip size to minimize the execution time. Our strategy consists of a detailed analytical model that characterizes the effect of strip size on program behavior. Then according to the model analysis, we design a simple strip size selection strategy, that is, the optimal strip size is 512 words. Our experimental results show that when the optimal strip size is used, the execution time is close to the experimentally best. It is certain that our strategy can efficiently exploit the tremendous potential of Imagine.
条带开采技术是提高Imagine上大规模科学应用性能的关键技术。在本文中,我们提出了一种模型导向的条带大小选择方法(OSS),用于寻找最佳条带大小以最小化执行时间。我们的策略包括一个详细的分析模型,该模型描述了条带尺寸对程序行为的影响。然后根据模型分析,我们设计了一个简单的条带大小选择策略,即最优条带大小为512字。实验结果表明,当采用最优条带尺寸时,执行时间接近实验最佳值。可以肯定的是,我们的战略可以有效地开发Imagine的巨大潜力。
{"title":"OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream Processor","authors":"Jing Du, Canqun Yang, F. Ao, Xuejun Yang","doi":"10.1109/WAINA.2008.63","DOIUrl":"https://doi.org/10.1109/WAINA.2008.63","url":null,"abstract":"Strip-mining technique is critical for improving performance of large-scale scientific applications on Imagine. In this paper, we present a model-guided strip size selection approach (OSS) for finding the optimal strip size to minimize the execution time. Our strategy consists of a detailed analytical model that characterizes the effect of strip size on program behavior. Then according to the model analysis, we design a simple strip size selection strategy, that is, the optimal strip size is 512 words. Our experimental results show that when the optimal strip size is used, the execution time is close to the experimentally best. It is certain that our strategy can efficiently exploit the tremendous potential of Imagine.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121708359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transparently Adding Security Properties to Service Orchestration 透明地向服务编排添加安全属性
Stéphanie Chollet, P. Lalanda, A. Bottaro
In this paper, we present a tool allowing the design of service orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an abstract way, as annotations on the services orchestration. Our purpose is to generate code, including security code, from this specification. This is especially important in the context of complex execution platforms like enterprise service buses. Our tool is used in the context of industrial plants using more and more services like DPWS to implement applications.
在本文中,我们提供了一个工具,允许在高层次抽象上设计服务编排。该工具还允许以抽象的方式指定安全属性,作为服务编排上的注释。我们的目的是从这个规范生成代码,包括安全代码。这在企业服务总线等复杂执行平台的上下文中尤其重要。我们的工具在工业工厂的环境中使用越来越多的服务,如DPWS来实现应用程序。
{"title":"Transparently Adding Security Properties to Service Orchestration","authors":"Stéphanie Chollet, P. Lalanda, A. Bottaro","doi":"10.1109/WAINA.2008.70","DOIUrl":"https://doi.org/10.1109/WAINA.2008.70","url":null,"abstract":"In this paper, we present a tool allowing the design of service orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an abstract way, as annotations on the services orchestration. Our purpose is to generate code, including security code, from this specification. This is especially important in the context of complex execution platforms like enterprise service buses. Our tool is used in the context of industrial plants using more and more services like DPWS to implement applications.","PeriodicalId":170418,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126058228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1