首页 > 最新文献

Proceedings 22nd International Conference on Distributed Computing Systems最新文献

英文 中文
Key trees and the security of interval multicast 密钥树与间隔组播的安全性
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022293
M. Gouda, Chin-Tser Huang, E. Elnozahy
A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper we describe how any user in the group can use the different keys in the key tree to securely multicast data to different subgroups within the group. The cost of securely multicasting data to a subgroup whose users are "consecutive" is O(log n) encryptions, where n is the total number of users in the group. The cost of securely multicasting data to an arbitrary subgroup is O(n/2) encryptions. However this cost can be reduced to one encryption by introducing an additional key tree to the group.
密钥树是一组用户可以使用的安全密钥的分布式数据结构。本文描述了组中的任意用户如何使用密钥树中的不同密钥向组内的不同子组安全地多播数据。将数据安全地多播到用户“连续”的子组的代价是O(log n)次加密,其中n是组中用户的总数。将数据安全地多播到任意子组的代价是O(n/2)次加密。但是,通过向组中引入额外的密钥树,可以将此成本减少到一个加密。
{"title":"Key trees and the security of interval multicast","authors":"M. Gouda, Chin-Tser Huang, E. Elnozahy","doi":"10.1109/ICDCS.2002.1022293","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022293","url":null,"abstract":"A key tree is a distributed data structure of security keys that can be used by a group of users. In this paper we describe how any user in the group can use the different keys in the key tree to securely multicast data to different subgroups within the group. The cost of securely multicasting data to a subgroup whose users are \"consecutive\" is O(log n) encryptions, where n is the total number of users in the group. The cost of securely multicasting data to an arbitrary subgroup is O(n/2) encryptions. However this cost can be reduced to one encryption by introducing an additional key tree to the group.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132827532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
RICA: a receiver-initiated approach for channel-adaptive on-demand routing in ad hoc mobile computing networks RICA:在自组织移动计算网络中用于信道自适应按需路由的一种接收机发起的方法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022245
Xiaohui Lin, Yu-Kwong Kwok, V. Lau
To support truly peer-to-peer applications in ad hoc wireless mobile computing networks, a judicious and efficient ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well known protocols are also being implemented in practical situations. However, one major drawback in existing state-of-the-art protocols, such as the AODV routing protocol, is that the time-varying nature of the wireless channels among the mobile terminals is ignored, let alone exploited. This can be a severe design shortcoming because the varying channel quality can lead to very poor overall route quality, in turn result in low data throughput. In this paper, by using a previously proposed adaptive channel coding and modulation scheme which allows a mobile terminal to dynamically adjust the data throughput via changing the amount of error protection incorporated, we devise a new receiver-initiated algorithm for ad hoc routing that dynamically changes the routes according to the channel conditions. Extensive simulation results indicate that our proposed protocol are more efficient in that shorter delays and higher rates are achieved.
为了在自组织无线移动计算网络中支持真正的点对点应用,需要一种明智而高效的自组织路由协议。在设计自组织路由协议方面已经做了大量的研究,一些知名的协议也在实际应用中得到了实现。然而,现有的最先进协议(如AODV路由协议)的一个主要缺点是,移动终端之间无线信道的时变特性被忽略了,更不用说利用了。这可能是一个严重的设计缺陷,因为不同的信道质量可能导致非常差的整体路由质量,从而导致低数据吞吐量。本文采用先前提出的自适应信道编码和调制方案,该方案允许移动终端通过改变所包含的错误保护的数量来动态调整数据吞吐量,我们设计了一种新的接收机发起的自组织路由算法,该算法根据信道条件动态改变路由。大量的仿真结果表明,我们提出的协议具有更短的延迟和更高的速率。
{"title":"RICA: a receiver-initiated approach for channel-adaptive on-demand routing in ad hoc mobile computing networks","authors":"Xiaohui Lin, Yu-Kwong Kwok, V. Lau","doi":"10.1109/ICDCS.2002.1022245","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022245","url":null,"abstract":"To support truly peer-to-peer applications in ad hoc wireless mobile computing networks, a judicious and efficient ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well known protocols are also being implemented in practical situations. However, one major drawback in existing state-of-the-art protocols, such as the AODV routing protocol, is that the time-varying nature of the wireless channels among the mobile terminals is ignored, let alone exploited. This can be a severe design shortcoming because the varying channel quality can lead to very poor overall route quality, in turn result in low data throughput. In this paper, by using a previously proposed adaptive channel coding and modulation scheme which allows a mobile terminal to dynamically adjust the data throughput via changing the amount of error protection incorporated, we devise a new receiver-initiated algorithm for ad hoc routing that dynamically changes the routes according to the channel conditions. Extensive simulation results indicate that our proposed protocol are more efficient in that shorter delays and higher rates are achieved.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Invariant consistency: a mechanism for inter-process ordering in distributed shared memory systems 不变一致性:分布式共享内存系统中进程间排序的机制
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022285
Gurdip Singh
We propose the notion of invariant consistency that allows programmers to specify inter-process ordering requirements. In our approach, we allow a programmer to label a program and provide an ordering specification. In particular, we associate a counter count/sub l/ with each label l that counts the number of times the operation labeled l has been executed. The ordering specification is given by an invariant on these counters.
我们提出不变一致性的概念,允许程序员指定进程间排序需求。在我们的方法中,我们允许程序员标记程序并提供排序规范。特别地,我们将计数器count/sub l/与每个标签l相关联,该标签l计算标记为l的操作执行的次数。排序规范由这些计数器上的不变量给出。
{"title":"Invariant consistency: a mechanism for inter-process ordering in distributed shared memory systems","authors":"Gurdip Singh","doi":"10.1109/ICDCS.2002.1022285","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022285","url":null,"abstract":"We propose the notion of invariant consistency that allows programmers to specify inter-process ordering requirements. In our approach, we allow a programmer to label a program and provide an ordering specification. In particular, we associate a counter count/sub l/ with each label l that counts the number of times the operation labeled l has been executed. The ordering specification is given by an invariant on these counters.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122928049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A reliable multicast algorithm for mobile ad hoc networks 一种可靠的移动自组织网络组播算法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022306
Thiagaraja Gopalsamy, M. Singhal, D. Panda, P. Sadayappan
A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path between a pair of nodes. The algorithm has the characteristics of using an undirected graph for its routing operations rather than a fixed structure like a tree or a mesh. Previously proposed routing metrics for mobile ad hoc networks were designed for use in wired environments, where link stability is not a concern. We propose a new metric, called the lifetime, which is more appropriate for mobile ad hoc networks. The lifetime metric is dependent on the predicted future life of the link under consideration. We developed a simulator for the mobile ad hoc networks, which is portable and scalable to a large number of nodes. Using the simulator, we carried out a simulation study to analyze the effectiveness of the routing metrics and the performance of the proposed reliable multicast algorithm. The simulation results show that the lifetime metric helps achieve better performance in mobile ad hoc environments than the hop count metric.
针对移动自组织网络,提出了一种可靠的组播算法RMA,该算法基于链路生存时间这一新的代价准则来确定一对节点之间的最优路径。该算法的特点是使用无向图进行路由操作,而不是像树或网格这样的固定结构。先前提出的移动自组织网络的路由指标是为在有线环境中使用而设计的,在有线环境中链路稳定性不是一个问题。我们提出了一个新的度量,称为生存期,它更适合于移动自组织网络。寿命度量依赖于所考虑的链路的预测未来寿命。我们为移动自组织网络开发了一个模拟器,该模拟器可移植且可扩展到大量节点。利用仿真器进行了仿真研究,分析了路由度量的有效性和所提出的可靠组播算法的性能。仿真结果表明,相对于跳数度量,生存时间度量在移动自组网环境下可以获得更好的性能。
{"title":"A reliable multicast algorithm for mobile ad hoc networks","authors":"Thiagaraja Gopalsamy, M. Singhal, D. Panda, P. Sadayappan","doi":"10.1109/ICDCS.2002.1022306","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022306","url":null,"abstract":"A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path between a pair of nodes. The algorithm has the characteristics of using an undirected graph for its routing operations rather than a fixed structure like a tree or a mesh. Previously proposed routing metrics for mobile ad hoc networks were designed for use in wired environments, where link stability is not a concern. We propose a new metric, called the lifetime, which is more appropriate for mobile ad hoc networks. The lifetime metric is dependent on the predicted future life of the link under consideration. We developed a simulator for the mobile ad hoc networks, which is portable and scalable to a large number of nodes. Using the simulator, we carried out a simulation study to analyze the effectiveness of the routing metrics and the performance of the proposed reliable multicast algorithm. The simulation results show that the lifetime metric helps achieve better performance in mobile ad hoc environments than the hop count metric.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124028042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
A practical approach for 'zero' downtime in an operational information system 在运行信息系统中实现“零”停机的实用方法
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022272
Ada Gavrilovska, K. Schwan, Van Oleson
An operational information system (OIS) supports a real-time view of an organization's information critical to its logistical business operations. A central component of an OIS is an engine that integrates data events captured from distributed, remote sources in order to derive meaningful real-time views of current operations. This event derivation engine (EDE) continuously updates these views and also publishes them to a potentially large number of remote subscribers. The paper first describes a sample OIS and EDE in the context of an airline's operations. It then defines the performance and availability requirements to be met by this system, specifically focusing on the EDE component. One particular requirement for the EDE is that subscribers to its output events should not experience downtime due to EDE failures, crashes or increased processing loads. Toward this end, we develop and evaluate a practical technique for masking failures and for hiding the costs of recovery from EDE subscribers. This technique utilizes redundant EDEs that coordinate view replicas with a relaxed synchronous fault tolerance protocol. A combination of pre- and post-buffering of replicas is used to attain a solution that offers low response times (i.e., 'zero' downtime) while also preventing system failures in the presence of deterministic faults like 'ill-formed' messages. Parallelism realized via a cluster machine and application-specific techniques for reducing synchronization across replicas are used to scale a 'zero' downtime EDE to support the large number of subscribers it must service.
操作信息系统(OIS)支持对组织的后勤业务操作至关重要的信息的实时视图。OIS的核心组件是一个引擎,它集成了从分布式远程数据源捕获的数据事件,从而获得当前操作的有意义的实时视图。此事件派生引擎(EDE)不断更新这些视图,并将它们发布给潜在的大量远程订阅者。本文首先描述了航空公司运营背景下的OIS和EDE样本。然后定义该系统要满足的性能和可用性需求,特别关注EDE组件。EDE的一个特殊要求是,其输出事件的订阅者不应由于EDE故障、崩溃或处理负载增加而经历停机。为此,我们开发并评估了一种实用的技术,用于屏蔽故障和向EDE订阅者隐藏恢复成本。这种技术利用冗余的ede,用宽松的同步容错协议来协调视图副本。使用副本的预缓冲和后缓冲的组合来获得提供低响应时间(即“零”停机时间)的解决方案,同时还可以防止存在确定性错误(如“格式错误”消息)时的系统故障。通过集群机器实现的并行性和用于减少副本间同步的特定于应用程序的技术用于扩展“零”停机时间EDE,以支持它必须服务的大量订阅者。
{"title":"A practical approach for 'zero' downtime in an operational information system","authors":"Ada Gavrilovska, K. Schwan, Van Oleson","doi":"10.1109/ICDCS.2002.1022272","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022272","url":null,"abstract":"An operational information system (OIS) supports a real-time view of an organization's information critical to its logistical business operations. A central component of an OIS is an engine that integrates data events captured from distributed, remote sources in order to derive meaningful real-time views of current operations. This event derivation engine (EDE) continuously updates these views and also publishes them to a potentially large number of remote subscribers. The paper first describes a sample OIS and EDE in the context of an airline's operations. It then defines the performance and availability requirements to be met by this system, specifically focusing on the EDE component. One particular requirement for the EDE is that subscribers to its output events should not experience downtime due to EDE failures, crashes or increased processing loads. Toward this end, we develop and evaluate a practical technique for masking failures and for hiding the costs of recovery from EDE subscribers. This technique utilizes redundant EDEs that coordinate view replicas with a relaxed synchronous fault tolerance protocol. A combination of pre- and post-buffering of replicas is used to attain a solution that offers low response times (i.e., 'zero' downtime) while also preventing system failures in the presence of deterministic faults like 'ill-formed' messages. Parallelism realized via a cluster machine and application-specific techniques for reducing synchronization across replicas are used to scale a 'zero' downtime EDE to support the large number of subscribers it must service.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
dRBAC: distributed role-based access control for dynamic coalition environments dRBAC:用于动态联盟环境的分布式基于角色的访问控制
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022279
E. Freudenthal, Tracy Pesin, Lawrence Port, E. Keenan, V. Karamcheti
distributed role-based access control (dRBAC) is a scalable, decentralized trust-management and access-control mechanism for systems that span multiple administrative domains. dRBAC utilizes PKI identities to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. The mapping of controlled actions to roles enables their namespaces to serve as policy roots. dRBAC distinguishes itself from previous approaches by providing three features: (1) third-party delegation of roles from outside a domain's namespace, relying upon an explicit delegation of assignment; (2) modulation of transferred permissions using scalar valued attributes associated with roles; and (3) continuous monitoring of trust relationships over long-lived interactions. The paper describes the dRBAC model and its scalable implementation using a graph approach to credential discovery and validation.
分布式基于角色的访问控制(dRBAC)是一种可扩展的、分散的信任管理和访问控制机制,适用于跨多个管理域的系统。dRBAC使用PKI身份来定义信任域,使用角色来定义受控活动,并使用跨域的角色委托来表示对这些活动的权限。受控操作到角色的映射使其名称空间可以作为策略根。dRBAC通过提供以下三个特性与之前的方法区别开来:(1)依赖于明确的委派,从域名称空间外部委托第三方角色;(2)使用与角色相关的标量值属性调制传输的权限;(3)持续监测长期互动中的信任关系。本文描述了dRBAC模型及其使用图方法进行凭据发现和验证的可扩展实现。
{"title":"dRBAC: distributed role-based access control for dynamic coalition environments","authors":"E. Freudenthal, Tracy Pesin, Lawrence Port, E. Keenan, V. Karamcheti","doi":"10.1109/ICDCS.2002.1022279","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022279","url":null,"abstract":"distributed role-based access control (dRBAC) is a scalable, decentralized trust-management and access-control mechanism for systems that span multiple administrative domains. dRBAC utilizes PKI identities to define trust domains, roles to define controlled activities, and role delegation across domains to represent permissions to these activities. The mapping of controlled actions to roles enables their namespaces to serve as policy roots. dRBAC distinguishes itself from previous approaches by providing three features: (1) third-party delegation of roles from outside a domain's namespace, relying upon an explicit delegation of assignment; (2) modulation of transferred permissions using scalar valued attributes associated with roles; and (3) continuous monitoring of trust relationships over long-lived interactions. The paper describes the dRBAC model and its scalable implementation using a graph approach to credential discovery and validation.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122928008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 244
Incremental replication for mobility support in OBIWAN OBIWAN中用于移动性支持的增量复制
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022262
L. Veiga, P. Ferreira
The need for sharing is well known in a large number of distributed collaborative applications. These applications are difficult to develop for wide area (possibly mobile) networks because of slow and unreliable connections. For this purpose, we developed a platform called OBIWAN that: i) allows the application to decide, in run-time, the mechanism by which objects should be invoked, remote method invocation or invocation on a local replica, ii) allows incremental replication of large object graphs, iii) allows the creation of dynamic clusters of data, and iv) provides hooks for the application programmer to implement a set of application specific properties such as relaxed transactional support or updates dissemination. These mechanisms allow an application to deal with situations that frequently occur in a (mobile) wide-area network, such as disconnections and slow links: i) as long as objects needed by an application (or by an agent) are colocated, there is no need to be connected to the network, and ii) it is possible to replace, in run-time, remote by local invocations on replicas, thus improving the performance and adaptability of applications. The prototype is developed in Java, is very small and simple to use, the performance results are very encouraging, and existing applications can be easily modified to take advantage of OBIWAN.
在大量分布式协作应用程序中,共享的需求是众所周知的。由于连接缓慢且不可靠,这些应用程序难以为广域(可能是移动)网络开发。为此,我们开发了一个名为OBIWAN的平台:I)允许应用程序在运行时决定调用对象的机制,远程方法调用或本地副本调用,ii)允许大型对象图的增量复制,iii)允许创建动态数据集群,iv)为应用程序编程人员提供钩子,以实现一组应用程序特定的属性,如宽松的事务支持或更新传播。这些机制允许应用程序处理在(移动)广域网中经常发生的情况,例如断开连接和慢速链接:i)只要应用程序(或代理)需要的对象被放置在一起,就不需要连接到网络,ii)在运行时可以用副本上的本地调用代替远程调用,从而提高应用程序的性能和适应性。该原型是用Java开发的,体积非常小,使用简单,性能结果非常令人鼓舞,并且可以很容易地修改现有应用程序以利用OBIWAN。
{"title":"Incremental replication for mobility support in OBIWAN","authors":"L. Veiga, P. Ferreira","doi":"10.1109/ICDCS.2002.1022262","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022262","url":null,"abstract":"The need for sharing is well known in a large number of distributed collaborative applications. These applications are difficult to develop for wide area (possibly mobile) networks because of slow and unreliable connections. For this purpose, we developed a platform called OBIWAN that: i) allows the application to decide, in run-time, the mechanism by which objects should be invoked, remote method invocation or invocation on a local replica, ii) allows incremental replication of large object graphs, iii) allows the creation of dynamic clusters of data, and iv) provides hooks for the application programmer to implement a set of application specific properties such as relaxed transactional support or updates dissemination. These mechanisms allow an application to deal with situations that frequently occur in a (mobile) wide-area network, such as disconnections and slow links: i) as long as objects needed by an application (or by an agent) are colocated, there is no need to be connected to the network, and ii) it is possible to replace, in run-time, remote by local invocations on replicas, thus improving the performance and adaptability of applications. The prototype is developed in Java, is very small and simple to use, the performance results are very encouraging, and existing applications can be easily modified to take advantage of OBIWAN.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
ControlWare: a middleware architecture for feedback control of software performance ControlWare:用于软件性能反馈控制的中间件体系结构
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022267
Ronghua Zhang, Chenyang Lu, T. Abdelzaher, J. Stankovic
Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded systems, many contemporary distributed real-time applications operate in environments where offered load and available resources suffer considerable random fluctuations, thereby complicating the performance assurance problem. Feedback control theory has recently been identified as a promising analytic foundation for controlling performance of such unpredictable, poorly modeled software systems, the same way other engineering disciplines have used this theory for physical process control. In this paper we describe the design and implementation of ControlWare, a middleware QoS-control architecture based on control theory, motivated by the needs of performance-assured Internet services. It offers a new type of guarantees we call convergence guarantees that lie between hard and probabilistic guarantees. The efficacy of the architecture in achieving its QoS goals under realistic load conditions is demonstrated in the context of web server and proxy QoS management.
在开放的、很大程度上不可预测的环境中实现软件性能保证最近成为实时研究的重要焦点。与封闭的嵌入式系统不同,许多当代分布式实时应用程序在提供的负载和可用资源遭受相当大的随机波动的环境中运行,从而使性能保证问题复杂化。反馈控制理论最近被认为是一种很有前途的分析基础,用于控制这种不可预测的、建模不良的软件系统的性能,就像其他工程学科将这一理论用于物理过程控制一样。本文描述了基于控制理论的中间件qos控制体系结构ControlWare的设计与实现。它提供了一种新的保证类型,我们称之为收敛保证,它介于硬保证和概率保证之间。在web服务器和代理QoS管理的背景下,证明了该体系结构在实际负载条件下实现其QoS目标的有效性。
{"title":"ControlWare: a middleware architecture for feedback control of software performance","authors":"Ronghua Zhang, Chenyang Lu, T. Abdelzaher, J. Stankovic","doi":"10.1109/ICDCS.2002.1022267","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022267","url":null,"abstract":"Attainment of software performance assurances in open, largely unpredictable environments has recently become an important focus for real-time research. Unlike closed embedded systems, many contemporary distributed real-time applications operate in environments where offered load and available resources suffer considerable random fluctuations, thereby complicating the performance assurance problem. Feedback control theory has recently been identified as a promising analytic foundation for controlling performance of such unpredictable, poorly modeled software systems, the same way other engineering disciplines have used this theory for physical process control. In this paper we describe the design and implementation of ControlWare, a middleware QoS-control architecture based on control theory, motivated by the needs of performance-assured Internet services. It offers a new type of guarantees we call convergence guarantees that lie between hard and probabilistic guarantees. The efficacy of the architecture in achieving its QoS goals under realistic load conditions is demonstrated in the context of web server and proxy QoS management.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130620638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 176
An optimal strategy for anonymous communication protocols 匿名通信协议的最优策略
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022263
Y. Guan, Xinwen Fu, R. Bettati, Wei Zhao
For many Internet applications, the ability to protect the identity of participants in a distributed applications is critical. For such applications, a number of anonymous communication systems have been realized over the recent years. The effectiveness of these systems relies greatly on the way messages are routed among the participants. (We call this the route selection strategy.) In this paper we describe how to select routes so as to maximize the ability of the anonymous communication systems to protect anonymity To measure this ability, we define a metric (anonymity degree), and we design and evaluate an optimal route selection strategy that maximizes the anonymity degree of a system. Our analytical and experimental data shows that the anonymity degree may not always monotonically increase as the length of communication paths increase. We also found that variable path-length strategies perform better than fixed-length strategies.
对于许多Internet应用程序,保护分布式应用程序中参与者的身份的能力是至关重要的。针对这些应用,近年来已经实现了许多匿名通信系统。这些系统的有效性在很大程度上依赖于消息在参与者之间路由的方式。(我们称之为路线选择策略。)为了衡量匿名通信系统的匿名保护能力,我们定义了一个度量(匿名度),并设计和评估了一个使系统匿名度最大化的最优路由选择策略。我们的分析和实验数据表明,匿名度并不总是随着通信路径长度的增加而单调增加。我们还发现可变路径长度策略比固定长度策略表现得更好。
{"title":"An optimal strategy for anonymous communication protocols","authors":"Y. Guan, Xinwen Fu, R. Bettati, Wei Zhao","doi":"10.1109/ICDCS.2002.1022263","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022263","url":null,"abstract":"For many Internet applications, the ability to protect the identity of participants in a distributed applications is critical. For such applications, a number of anonymous communication systems have been realized over the recent years. The effectiveness of these systems relies greatly on the way messages are routed among the participants. (We call this the route selection strategy.) In this paper we describe how to select routes so as to maximize the ability of the anonymous communication systems to protect anonymity To measure this ability, we define a metric (anonymity degree), and we design and evaluate an optimal route selection strategy that maximizes the anonymity degree of a system. Our analytical and experimental data shows that the anonymity degree may not always monotonically increase as the length of communication paths increase. We also found that variable path-length strategies perform better than fixed-length strategies.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
An extensible and scalable Content Adaptation Pipeline architecture to support heterogeneous clients 支持异构客户机的可扩展和可伸缩的内容适应管道体系结构
Pub Date : 2002-07-02 DOI: 10.1109/ICDCS.2002.1022300
T. Phan, George Zorpas, R. Bagrodia
The importance of middleware and content adaptation has previously been demonstrated for pervasive use of Web-based applications. In this paper we propose a modular extensible, and scalable middleware component called the Content Adaptation Pipeline that performs content adaptation on arbitrarily complex data types not limited to text and graphic images. Furthermore, the architecture can be used as part of many client-server applications, not just Web browsers. In our work we leverage the XML language as a uniform means to describe all the elements in our architecture, including the client device and user profiles, the data characteristics, the transcoding operations performed on the data, and the resultant adapted data. We illustrate the flexibility of our architecture to support new data types and adaptation operations by first showing its use with data from a real-world medical application and then extending its capabilities to handle animated graphics and also real-time streaming RTP data. Finally, we demonstrate scalability in our architecture by executing the Content Adaptation Pipeline over a distributed set of servers running an efficient protocol.
中间件和内容适应的重要性之前已经在基于web的应用程序的广泛使用中得到了证明。在本文中,我们提出了一个模块化的、可扩展的、可伸缩的中间件组件,称为Content Adaptation Pipeline,它可以对任意复杂的数据类型(不限于文本和图形图像)执行内容适配。此外,该体系结构可以用作许多客户机-服务器应用程序的一部分,而不仅仅是Web浏览器。在我们的工作中,我们利用XML语言作为一种统一的方法来描述我们体系结构中的所有元素,包括客户机设备和用户配置文件、数据特征、对数据执行的转码操作以及最终的改编数据。我们演示了我们的架构在支持新数据类型和适应操作方面的灵活性,首先展示了它与来自现实世界的医疗应用程序的数据的使用,然后扩展了它处理动画图形和实时流RTP数据的能力。最后,我们通过在一组运行高效协议的分布式服务器上执行Content Adaptation Pipeline来演示体系结构中的可伸缩性。
{"title":"An extensible and scalable Content Adaptation Pipeline architecture to support heterogeneous clients","authors":"T. Phan, George Zorpas, R. Bagrodia","doi":"10.1109/ICDCS.2002.1022300","DOIUrl":"https://doi.org/10.1109/ICDCS.2002.1022300","url":null,"abstract":"The importance of middleware and content adaptation has previously been demonstrated for pervasive use of Web-based applications. In this paper we propose a modular extensible, and scalable middleware component called the Content Adaptation Pipeline that performs content adaptation on arbitrarily complex data types not limited to text and graphic images. Furthermore, the architecture can be used as part of many client-server applications, not just Web browsers. In our work we leverage the XML language as a uniform means to describe all the elements in our architecture, including the client device and user profiles, the data characteristics, the transcoding operations performed on the data, and the resultant adapted data. We illustrate the flexibility of our architecture to support new data types and adaptation operations by first showing its use with data from a real-world medical application and then extending its capabilities to handle animated graphics and also real-time streaming RTP data. Finally, we demonstrate scalability in our architecture by executing the Content Adaptation Pipeline over a distributed set of servers running an efficient protocol.","PeriodicalId":186210,"journal":{"name":"Proceedings 22nd International Conference on Distributed Computing Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
期刊
Proceedings 22nd International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1