首页 > 最新文献

2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
Optimization of Partitioned Architectures to Support Soft Real-Time Applications 支持软实时应用的分区架构优化
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.36
D. Tamas-Selicean, P. Pop
In this paper we propose a new Tabu Search-based design optimization strategy for mixed-criticality systems implementing hard and soft real-time applications on the same platform. Our proposed strategy determined an implementation such that all hard real-time applications are schedulable and the quality of service of the soft real-time tasks is maximized. We have evaluated our strategy using an aerospace case study.
针对在同一平台上实现软硬实时应用的混合临界系统,提出了一种新的基于禁忌搜索的设计优化策略。我们提出的策略确定了这样一种实现,即所有硬实时应用程序都是可调度的,而软实时任务的服务质量是最大化的。我们利用航空航天案例研究评估了我们的战略。
{"title":"Optimization of Partitioned Architectures to Support Soft Real-Time Applications","authors":"D. Tamas-Selicean, P. Pop","doi":"10.1109/PRDC.2014.36","DOIUrl":"https://doi.org/10.1109/PRDC.2014.36","url":null,"abstract":"In this paper we propose a new Tabu Search-based design optimization strategy for mixed-criticality systems implementing hard and soft real-time applications on the same platform. Our proposed strategy determined an implementation such that all hard real-time applications are schedulable and the quality of service of the soft real-time tasks is maximized. We have evaluated our strategy using an aerospace case study.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122647407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Software Fault Detection and Correction Processes Considering Different Skill Levels of Debuggers 考虑不同调试人员技能水平的软件故障检测与校正过程仿真
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.27
R. Peng, F. R. Shahrzad
Since analytical software reliability growth models (SRGMs) are difficult to incorporate complex factors, some researchers have tried to model fault detection process (FDP) and fault correction process (FCP) together through simulation approaches. In these works, the debuggers are assumed to be with the same skill level, which may be unrealistic. In this paper, a simulation approach is proposed to model FDP and FCP considering debuggers with different skill levels. The optimal combination of different debuggers and the optimal release time are discussed.
由于分析软件可靠性增长模型(SRGMs)难以纳入复杂因素,一些研究者试图通过仿真方法将故障检测过程(FDP)和故障校正过程(FCP)结合在一起进行建模。在这些作品中,假定调试器具有相同的技能水平,这可能是不现实的。本文提出了一种考虑不同调试水平的FDP和FCP仿真方法。讨论了不同调试器的最佳组合和最佳释放时间。
{"title":"Simulation of Software Fault Detection and Correction Processes Considering Different Skill Levels of Debuggers","authors":"R. Peng, F. R. Shahrzad","doi":"10.1109/PRDC.2014.27","DOIUrl":"https://doi.org/10.1109/PRDC.2014.27","url":null,"abstract":"Since analytical software reliability growth models (SRGMs) are difficult to incorporate complex factors, some researchers have tried to model fault detection process (FDP) and fault correction process (FCP) together through simulation approaches. In these works, the debuggers are assumed to be with the same skill level, which may be unrealistic. In this paper, a simulation approach is proposed to model FDP and FCP considering debuggers with different skill levels. The optimal combination of different debuggers and the optimal release time are discussed.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121905614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Nature and Content of Safety Contracts: Challenges and Suggestions for a Way Forward 安全合同的性质与内容:挑战与建议
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.24
P. Graydon, I. Bate
Software engineering researchers have extensively explored the reuse of components at source-code level. Contracts explicitly describe component behaviour, reducing development risk by exposing potential incompatibilities early in the development process. But to benefit fully from reuse, developers of safety-critical systems must also reuse safety evidence. Full reuse would require both extending the existing notion of component contracts to cover safety properties and using these contracts in both component selection and system certification. This is not as simple as it first appears. Much of the review, analysis, and test evidence developers provide during certification is system-specific. This makes it difficult to define safety contracts that facilitate both selecting components to reuse and certifying systems. In this paper, we explore the definition and use of safety contracts, identify challenges to component-based software reuse safety-critical systems, present examples to illustrate several key difficulties, and discuss potential solutions to these problems.
软件工程研究人员已经在源代码级别广泛地探索了组件的重用。契约显式地描述组件行为,通过在开发过程的早期暴露潜在的不兼容性来降低开发风险。但是,为了从重用中充分获益,安全关键系统的开发人员也必须重用安全证据。完全重用既需要扩展组件契约的现有概念以涵盖安全属性,又需要在组件选择和系统认证中使用这些契约。这并不像最初看起来那么简单。开发人员在认证期间提供的许多审查、分析和测试证据都是特定于系统的。这使得定义安全契约变得困难,这些安全契约既可以方便地选择要重用的组件,也可以方便地对系统进行认证。在本文中,我们探讨了安全契约的定义和使用,确定了对基于组件的软件重用安全关键系统的挑战,提出了一些例子来说明几个关键的困难,并讨论了这些问题的潜在解决方案。
{"title":"The Nature and Content of Safety Contracts: Challenges and Suggestions for a Way Forward","authors":"P. Graydon, I. Bate","doi":"10.1109/PRDC.2014.24","DOIUrl":"https://doi.org/10.1109/PRDC.2014.24","url":null,"abstract":"Software engineering researchers have extensively explored the reuse of components at source-code level. Contracts explicitly describe component behaviour, reducing development risk by exposing potential incompatibilities early in the development process. But to benefit fully from reuse, developers of safety-critical systems must also reuse safety evidence. Full reuse would require both extending the existing notion of component contracts to cover safety properties and using these contracts in both component selection and system certification. This is not as simple as it first appears. Much of the review, analysis, and test evidence developers provide during certification is system-specific. This makes it difficult to define safety contracts that facilitate both selecting components to reuse and certifying systems. In this paper, we explore the definition and use of safety contracts, identify challenges to component-based software reuse safety-critical systems, present examples to illustrate several key difficulties, and discuss potential solutions to these problems.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121304214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
FoxyFeed: Forging Device-Level Asynchronous Events for Kernel Development FoxyFeed:为内核开发锻造设备级异步事件
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.25
K. Kono, Shunsuke Miyahara, H. Yamada, Takeshi Yoshimura
Enhancing source code quality of operating systems (OSes) is an essential and endless task in communities of commodity OSes. Unfortunately, improving the quality of the kernel code is not trivial because the kernel is large and complex. In particular, asynchronous events from peripheral devices such as interrupts make the improvement quite hard due to their low reproducibility. This paper presents Foxy Feed, a mechanism based on virtual machine monitors that helps to fix bugs caused by asynchronous device-level events. Foxy Feed forges device-level events and injects them to a debuggee kernel at the timing specified in advance, and allows us to control the timing at which asynchronous events occur for the debugging purpose. Using our prototype implementation of Foxy Feed, which is based on Xen 4.1.0, we demonstrate that Foxy Feed reproduces failures caused by device-triggered bugs in Linux and gives significant clues to the root causes.
在商用操作系统社区中,提高操作系统的源代码质量是一项必不可少的、永无止境的任务。不幸的是,提高内核代码的质量并不是一件容易的事,因为内核既大又复杂。特别是,来自外围设备(如中断)的异步事件由于其低再现性而使改进变得相当困难。本文介绍了Foxy Feed,这是一种基于虚拟机监视器的机制,可以帮助修复由异步设备级事件引起的错误。Foxy Feed生成设备级事件,并在预先指定的时间将它们注入到debuggee内核中,并允许我们控制异步事件发生的时间以进行调试。使用基于Xen 4.1.0的Foxy Feed的原型实现,我们演示了Foxy Feed再现了Linux中由设备触发的错误引起的故障,并为根本原因提供了重要线索。
{"title":"FoxyFeed: Forging Device-Level Asynchronous Events for Kernel Development","authors":"K. Kono, Shunsuke Miyahara, H. Yamada, Takeshi Yoshimura","doi":"10.1109/PRDC.2014.25","DOIUrl":"https://doi.org/10.1109/PRDC.2014.25","url":null,"abstract":"Enhancing source code quality of operating systems (OSes) is an essential and endless task in communities of commodity OSes. Unfortunately, improving the quality of the kernel code is not trivial because the kernel is large and complex. In particular, asynchronous events from peripheral devices such as interrupts make the improvement quite hard due to their low reproducibility. This paper presents Foxy Feed, a mechanism based on virtual machine monitors that helps to fix bugs caused by asynchronous device-level events. Foxy Feed forges device-level events and injects them to a debuggee kernel at the timing specified in advance, and allows us to control the timing at which asynchronous events occur for the debugging purpose. Using our prototype implementation of Foxy Feed, which is based on Xen 4.1.0, we demonstrate that Foxy Feed reproduces failures caused by device-triggered bugs in Linux and gives significant clues to the root causes.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124338218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction of NBTI-Induced Degradation on Ring Oscillators in FPGA FPGA环振中nbti诱导退化的降低
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.16
Yasuo Sato, M. Monden, Yousuke Miyake, S. Kajihara
Ring Oscillators are used for variety of purposes to enhance reliability on LSIs or FPGAs. This paper introduces an aging-tolerant design structure of ring oscillators that are used in FPGAs. The structure is able to reduce NBTI-induced degradation in a ring oscillator's frequency by setting PMOS transistors of look-up tables in an off-state when the oscillator is not working. The evaluation of a variety of ring oscillators using Altera Cyclone IV device (60nm technology) shows that the proposed structure is capable of controlling degradation level as well as reducing more than 37% performance degradation compared to the conventional oscillators.
环形振荡器用于各种目的,以提高lsi或fpga的可靠性。介绍了一种用于fpga的环形振荡器的耐老化设计结构。当振荡器不工作时,通过将查找表的PMOS晶体管设置为关闭状态,该结构能够减少nbti引起的环形振荡器频率下降。使用Altera Cyclone IV器件(60nm技术)对各种环形振荡器进行的评估表明,与传统振荡器相比,所提出的结构能够控制退化水平,并减少37%以上的性能退化。
{"title":"Reduction of NBTI-Induced Degradation on Ring Oscillators in FPGA","authors":"Yasuo Sato, M. Monden, Yousuke Miyake, S. Kajihara","doi":"10.1109/PRDC.2014.16","DOIUrl":"https://doi.org/10.1109/PRDC.2014.16","url":null,"abstract":"Ring Oscillators are used for variety of purposes to enhance reliability on LSIs or FPGAs. This paper introduces an aging-tolerant design structure of ring oscillators that are used in FPGAs. The structure is able to reduce NBTI-induced degradation in a ring oscillator's frequency by setting PMOS transistors of look-up tables in an off-state when the oscillator is not working. The evaluation of a variety of ring oscillators using Altera Cyclone IV device (60nm technology) shows that the proposed structure is capable of controlling degradation level as well as reducing more than 37% performance degradation compared to the conventional oscillators.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114352262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reliability of Geo-replicated Cloud Storage Systems 两地复制云存储系统可靠性
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.30
I. Iliadis, D. Sotnikov, Paula Ta-Shma, V. Venkatesan
Network bandwidth between sites is typically more scarce than bandwidth within a site in geo-replicated cloud storage systems, and can potentially be a bottleneck for recovery operations. We study the reliability of geo-replicated cloud storage systems taking into account different bandwidths within a site and between sites. We consider a new recovery scheme called staged rebuild and compare it with both a direct scheme and a scheme known as intelligent rebuild. To assess the reliability gains achieved by these schemes, we develop an analytical model that incorporates various relevant aspects of storage systems, such as bandwidths, latent sector errors, and failure distributions. The model applies in the context of Open Stack Swift, a widely deployed cloud storage system. Under certain practical system configurations, we establish that order of magnitude improvements in mean time to data loss (MTTDL) can be achieved using these schemes.
在地理复制云存储系统中,站点之间的网络带宽通常比站点内的带宽更稀缺,并且可能成为恢复操作的瓶颈。我们研究了考虑到站点内和站点之间不同带宽的地理复制云存储系统的可靠性。我们考虑了一种称为分阶段重建的新恢复方案,并将其与直接重建方案和智能重建方案进行了比较。为了评估这些方案所获得的可靠性收益,我们开发了一个分析模型,该模型结合了存储系统的各个相关方面,如带宽、潜在扇区错误和故障分布。该模型适用于广泛部署的云存储系统Open Stack Swift。在某些实际系统配置下,我们确定使用这些方案可以实现平均数据丢失时间(MTTDL)的数量级改进。
{"title":"Reliability of Geo-replicated Cloud Storage Systems","authors":"I. Iliadis, D. Sotnikov, Paula Ta-Shma, V. Venkatesan","doi":"10.1109/PRDC.2014.30","DOIUrl":"https://doi.org/10.1109/PRDC.2014.30","url":null,"abstract":"Network bandwidth between sites is typically more scarce than bandwidth within a site in geo-replicated cloud storage systems, and can potentially be a bottleneck for recovery operations. We study the reliability of geo-replicated cloud storage systems taking into account different bandwidths within a site and between sites. We consider a new recovery scheme called staged rebuild and compare it with both a direct scheme and a scheme known as intelligent rebuild. To assess the reliability gains achieved by these schemes, we develop an analytical model that incorporates various relevant aspects of storage systems, such as bandwidths, latent sector errors, and failure distributions. The model applies in the context of Open Stack Swift, a widely deployed cloud storage system. Under certain practical system configurations, we establish that order of magnitude improvements in mean time to data loss (MTTDL) can be achieved using these schemes.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Codes Correcting Asymmetric/Unidirectional Errors along with Bidirectional Errors of Small Magnitude 编码校正非对称/单向误差以及小幅度的双向误差
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.28
Shohei Kotaki, M. Kitakami
Dominant error sources in multi-level cell NAND Flash memories shift threshold voltage levels to either positive or negative values, thus errors are modeled by nonbinary unidirectional channels. However, bidirectional errors can also be caused when positive and negative errors have equivalent significance. Compared to unidirectional cases, error magnitude of bidirectional errors are considered to be small. In this correspondence, novel error correcting codes which correct limited magnitude asymmetric/unidirectional errors along with bidirectional errors of relatively small magnitude are presented. They can be used to reduce encoding and decoding complexity compared to conventional symmetric error correcting codes.
在多单元NAND闪存中,主要的误差源会将阈值电压水平移至正或负值,因此误差是由非二进制单向通道建模的。然而,当正负误差具有同等意义时,也会产生双向误差。与单向情况相比,双向误差的误差幅度较小。在这种通信中,提出了一种新的纠错码,可以纠正有限幅度的非对称/单向误差以及相对较小幅度的双向误差。与传统的对称纠错码相比,它们可以用来降低编码和解码的复杂性。
{"title":"Codes Correcting Asymmetric/Unidirectional Errors along with Bidirectional Errors of Small Magnitude","authors":"Shohei Kotaki, M. Kitakami","doi":"10.1109/PRDC.2014.28","DOIUrl":"https://doi.org/10.1109/PRDC.2014.28","url":null,"abstract":"Dominant error sources in multi-level cell NAND Flash memories shift threshold voltage levels to either positive or negative values, thus errors are modeled by nonbinary unidirectional channels. However, bidirectional errors can also be caused when positive and negative errors have equivalent significance. Compared to unidirectional cases, error magnitude of bidirectional errors are considered to be small. In this correspondence, novel error correcting codes which correct limited magnitude asymmetric/unidirectional errors along with bidirectional errors of relatively small magnitude are presented. They can be used to reduce encoding and decoding complexity compared to conventional symmetric error correcting codes.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131129787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploiting Synchronicity for Immediate Feedback in Self-Stabilizing PIF Algorithms 自稳定PIF算法中即时反馈的同步性利用
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.21
Oday Jubran, Oliver E. Theel
A distributed algorithm, run by distributed processes, satisfies mutual exclusion if at most one process is granted a privilege to access the critical section in each execution step (safety), and each process is privileged infinitely often in each execution (fairness). The design of mutual exclusion algorithms is, in particular, impacted to satisfy the fairness property. In this work, we focus on a class of synchronous systems, where processes rarely request a privilege, that the fairness property is satisfied anyway if the process selection is fast enough. We also consider that systems of this class have to satisfy self-stabilization, which ensures that a system eventually achieves its desired behavior, and does not leave it voluntarily, regardless of the system's initial behavior. We present a self-stabilizing synchronous Propagation of Information with Feedback (PIF) algorithm for trees. The algorithm exploits the synchronous environment to provide immediate feedback of requesting processes, which in turn guarantees fast selection of unique processes to be granted privileges.
如果在每个执行步骤中最多有一个进程被授予访问临界区的特权(安全性),并且每个进程在每次执行中被授予无限次特权(公平性),则由分布式进程运行的分布式算法满足互斥性。特别是互斥算法的设计,要满足公平性的要求。在这项工作中,我们关注一类同步系统,其中进程很少请求特权,如果进程选择足够快,无论如何都满足公平性属性。我们还认为,这类系统必须满足自稳定,这确保系统最终达到其期望的行为,而不是自愿离开它,无论系统的初始行为如何。提出了一种具有反馈的自稳定同步信息传播(PIF)算法。该算法利用同步环境提供请求进程的即时反馈,从而保证快速选择要授予特权的唯一进程。
{"title":"Exploiting Synchronicity for Immediate Feedback in Self-Stabilizing PIF Algorithms","authors":"Oday Jubran, Oliver E. Theel","doi":"10.1109/PRDC.2014.21","DOIUrl":"https://doi.org/10.1109/PRDC.2014.21","url":null,"abstract":"A distributed algorithm, run by distributed processes, satisfies mutual exclusion if at most one process is granted a privilege to access the critical section in each execution step (safety), and each process is privileged infinitely often in each execution (fairness). The design of mutual exclusion algorithms is, in particular, impacted to satisfy the fairness property. In this work, we focus on a class of synchronous systems, where processes rarely request a privilege, that the fairness property is satisfied anyway if the process selection is fast enough. We also consider that systems of this class have to satisfy self-stabilization, which ensures that a system eventually achieves its desired behavior, and does not leave it voluntarily, regardless of the system's initial behavior. We present a self-stabilizing synchronous Propagation of Information with Feedback (PIF) algorithm for trees. The algorithm exploits the synchronous environment to provide immediate feedback of requesting processes, which in turn guarantees fast selection of unique processes to be granted privileges.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121818280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coarse-Grained Parallel Uniformization for Continuous-Time Markov Chains 连续时间马尔可夫链的粗粒度并行均匀化
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.22
H. Okamura, Y. Kunimoto, T. Dohi
This paper discusses parallel algorithms for transient analysis of continuous-time Markov chains (CTMCs). In dependable computing, it is used for evaluating the rare events such as failure based on CTMC models. The uniformizaton is a well-known algorithm for obtaining the transient solution of CTMC. However, the computation cost of uniformization is not low in the case of large-sized and stiff CTMCs. This paper considers parallelization of the uniformization algorithm. Particularly, we propose a coarse-grained parallel uniformization which is appropriate for multicore processors. This method enables us to analyze the large-sized and stiff CTMCs efficiently. In numerical examples, we examine the effectiveness of the proposed parallel algorithms with multicore processors.
本文讨论了连续时间马尔可夫链暂态分析的并行算法。在可靠计算中,基于CTMC模型对故障等罕见事件进行评估。均匀化算法是求解CTMC暂态解的一种著名算法。然而,对于大型刚性ctmc,均匀化的计算成本并不低。本文考虑了均匀化算法的并行化问题。特别地,我们提出了一种适合多核处理器的粗粒度并行统一。该方法可以有效地分析大型刚性ctmc。在数值例子中,我们检验了所提出的多核并行算法的有效性。
{"title":"Coarse-Grained Parallel Uniformization for Continuous-Time Markov Chains","authors":"H. Okamura, Y. Kunimoto, T. Dohi","doi":"10.1109/PRDC.2014.22","DOIUrl":"https://doi.org/10.1109/PRDC.2014.22","url":null,"abstract":"This paper discusses parallel algorithms for transient analysis of continuous-time Markov chains (CTMCs). In dependable computing, it is used for evaluating the rare events such as failure based on CTMC models. The uniformizaton is a well-known algorithm for obtaining the transient solution of CTMC. However, the computation cost of uniformization is not low in the case of large-sized and stiff CTMCs. This paper considers parallelization of the uniformization algorithm. Particularly, we propose a coarse-grained parallel uniformization which is appropriate for multicore processors. This method enables us to analyze the large-sized and stiff CTMCs efficiently. In numerical examples, we examine the effectiveness of the proposed parallel algorithms with multicore processors.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130485854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient VM Introspection in KVM and Performance Comparison with Xen KVM中高效的VM自省及与Xen的性能比较
Pub Date : 2014-11-18 DOI: 10.1109/PRDC.2014.33
Kenichi Kourai, Kousuke Nakamura
Intrusion detection system (IDS) offloading is useful for securely executing IDSes. It runs a target system in a virtual machine (VM) and enables IDSes to monitor the VM from the outside using VM introspection. Although VM introspection is well studied, its performance has not been reported in detail. The performance becomes important when users choose virtualization software, e.g., Xen and KVM. However, the performance comparison is difficult because there is no efficient implementation of VM introspection in KVM. In this paper, we first propose KVMonitor for efficient VM introspection in KVM. Using KVMonitor, we have ported Transcall for offloading legacy IDSes. For memory introspection, KVMonitor was 32 times faster than the existing LibVMI. Then we present performance comparison between Xen and KVM on VM introspection. The experimental results showed that checking the kernel memory with KVMonitor was 118 times faster than that in Xen. Even for legacy chkrootkit, the execution time with KVMonitor was 63% shorter than that in Xen.
入侵检测系统(IDS)卸载对于安全执行入侵检测系统非常有用。它在虚拟机(VM)中运行目标系统,并允许ids使用VM自省从外部监视VM。尽管VM自省已经得到了很好的研究,但其性能还没有详细的报道。当用户选择虚拟化软件(例如Xen和KVM)时,性能变得很重要。然而,性能比较是困难的,因为KVM中没有有效的VM内省实现。在本文中,我们首先提出了KVM monitor,用于在KVM中实现高效的VM内省。使用KVMonitor,我们移植了Transcall来卸载遗留的ids。对于内存自省,KVMonitor比现有的LibVMI快32倍。然后我们比较了Xen和KVM在VM内省方面的性能。实验结果表明,使用KVMonitor检查内核内存比在Xen中快118倍。即使对于旧的chkrootkit, KVMonitor的执行时间也比Xen短63%。
{"title":"Efficient VM Introspection in KVM and Performance Comparison with Xen","authors":"Kenichi Kourai, Kousuke Nakamura","doi":"10.1109/PRDC.2014.33","DOIUrl":"https://doi.org/10.1109/PRDC.2014.33","url":null,"abstract":"Intrusion detection system (IDS) offloading is useful for securely executing IDSes. It runs a target system in a virtual machine (VM) and enables IDSes to monitor the VM from the outside using VM introspection. Although VM introspection is well studied, its performance has not been reported in detail. The performance becomes important when users choose virtualization software, e.g., Xen and KVM. However, the performance comparison is difficult because there is no efficient implementation of VM introspection in KVM. In this paper, we first propose KVMonitor for efficient VM introspection in KVM. Using KVMonitor, we have ported Transcall for offloading legacy IDSes. For memory introspection, KVMonitor was 32 times faster than the existing LibVMI. Then we present performance comparison between Xen and KVM on VM introspection. The experimental results showed that checking the kernel memory with KVMonitor was 118 times faster than that in Xen. Even for legacy chkrootkit, the execution time with KVMonitor was 63% shorter than that in Xen.","PeriodicalId":187000,"journal":{"name":"2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133961258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1