首页 > 最新文献

2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing最新文献

英文 中文
Towards Inter-cloud Schedulers: A Survey of Meta-scheduling Approaches 迈向云间调度器:元调度方法综述
Stelios Sotiriadis, N. Bessis, N. Antonopoulos
Cloud computing has emerged as one of the latest technologies for delivering on-demand advanced services over the internet. Various cloud providers have developed data-centres which are spread at several geographically locations, and are available for utilization from internet users. However, as the number of resource consumers is increasing significantly, it becomes apparent that the capacity-oriented clouds require coming together and agreeing on common acting behaviours for improving the quality of service, hence providing an overall optimal load allocation. In this direction, current solutions do not support a coordinated distribution of different cloud workloads. Even geographically distributed data-centres from the same vendor (e.g. Amazon) don't support a seamless mechanic for balancing hosted services as the users require indicating their selected hosts' location. To answer this limitation, a recently emerged inter-clouds notion comes to expand cloud capabilities and to offer an improved sharing paradigm of workloads. Herein we present a state-of-the-art review with a particular focus on the adoptability of current meta-schedulers for managing workloads, towards the inter-cloud era. Specifically, by exploiting inter-cloud requirements (e.g. flexibility, geographically distribution etc.) we evaluate various meta-schedulers for future inter-clouds.
云计算已经成为在互联网上提供按需高级服务的最新技术之一。各种云提供商开发了分布在几个地理位置的数据中心,可供互联网用户使用。然而,随着资源消费者的数量显著增加,很明显,面向容量的云需要聚集在一起,并就共同的行为达成一致,以提高服务质量,从而提供总体上最优的负载分配。在这个方向上,当前的解决方案不支持不同云工作负载的协调分布。即使是来自同一供应商(例如Amazon)的地理上分布的数据中心也不支持平衡托管服务的无缝机制,因为用户需要指示他们所选择的主机的位置。为了解决这一限制,最近出现了一个云间概念,用于扩展云功能并提供改进的工作负载共享范例。在此,我们对当前的元调度器进行了最新的回顾,特别关注当前用于管理工作负载的元调度器在云间时代的可采用率。具体来说,通过利用云间需求(例如灵活性、地理分布等),我们评估了未来云间的各种元调度器。
{"title":"Towards Inter-cloud Schedulers: A Survey of Meta-scheduling Approaches","authors":"Stelios Sotiriadis, N. Bessis, N. Antonopoulos","doi":"10.1109/3PGCIC.2011.19","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.19","url":null,"abstract":"Cloud computing has emerged as one of the latest technologies for delivering on-demand advanced services over the internet. Various cloud providers have developed data-centres which are spread at several geographically locations, and are available for utilization from internet users. However, as the number of resource consumers is increasing significantly, it becomes apparent that the capacity-oriented clouds require coming together and agreeing on common acting behaviours for improving the quality of service, hence providing an overall optimal load allocation. In this direction, current solutions do not support a coordinated distribution of different cloud workloads. Even geographically distributed data-centres from the same vendor (e.g. Amazon) don't support a seamless mechanic for balancing hosted services as the users require indicating their selected hosts' location. To answer this limitation, a recently emerged inter-clouds notion comes to expand cloud capabilities and to offer an improved sharing paradigm of workloads. Herein we present a state-of-the-art review with a particular focus on the adoptability of current meta-schedulers for managing workloads, towards the inter-cloud era. Specifically, by exploiting inter-cloud requirements (e.g. flexibility, geographically distribution etc.) we evaluate various meta-schedulers for future inter-clouds.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"274 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Classification with Pseudo Neural Networks Based on Evolutionary Symbolic Regression 基于进化符号回归的伪神经网络分类
Z. Oplatková, R. Šenkeřík
This research deals with a novel approach to classification. Classical artificial neural networks, where a relation between inputs and outputs is based on the mathematical transfer functions and optimized numerical weights, was an inspiration for this work. Artificial neural networks need to optimize weights, but the structure and transfer functions are usually set up before the training. There exist some evolutionary approaches, which help to set up the structure or to optimize weights in different ways than standard artificial neural networks do. The proposed method utilizes the symbolic regression for synthesis of a whole structure, i.e. the relation between inputs and output(s). For experimentation, Differential Evolution (DE) and Self Organizing Migrating Algorithm (SOMA) for the main procedure of analytic programming (AP) and DE as an algorithm for meta-evolution were used.
本研究涉及一种新的分类方法。经典的人工神经网络,其中输入和输出之间的关系是基于数学传递函数和优化的数值权重,是这项工作的灵感。人工神经网络需要优化权值,但通常在训练前就已经建立了结构和传递函数。与标准人工神经网络相比,存在一些进化方法,以不同的方式帮助建立结构或优化权重。所提出的方法利用符号回归来综合整个结构,即输入和输出之间的关系。实验采用差分进化(DE)和自组织迁移算法(SOMA)作为分析规划(AP)的主要程序,并采用差分进化(DE)作为元进化算法。
{"title":"Classification with Pseudo Neural Networks Based on Evolutionary Symbolic Regression","authors":"Z. Oplatková, R. Šenkeřík","doi":"10.1109/3PGCIC.2011.74","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.74","url":null,"abstract":"This research deals with a novel approach to classification. Classical artificial neural networks, where a relation between inputs and outputs is based on the mathematical transfer functions and optimized numerical weights, was an inspiration for this work. Artificial neural networks need to optimize weights, but the structure and transfer functions are usually set up before the training. There exist some evolutionary approaches, which help to set up the structure or to optimize weights in different ways than standard artificial neural networks do. The proposed method utilizes the symbolic regression for synthesis of a whole structure, i.e. the relation between inputs and output(s). For experimentation, Differential Evolution (DE) and Self Organizing Migrating Algorithm (SOMA) for the main procedure of analytic programming (AP) and DE as an algorithm for meta-evolution were used.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Situation-Based Service Composition Model for Dynamic Environments 动态环境下基于情境的服务组合模型
H. Le
This paper presents a situation-based service composition model for dynamic environments in which the characteristics of the surrounding environments are frequently changing. The main contribution of situation-based service composition model is: (1) to provide a concept of situations which specified the mutual affects of situated conditions and situated services, and (2) to provide an adaptation mechanism to support the planning and adaptation of composite services in specific situations.
本文提出了一种基于情境的动态环境服务组合模型,该模型适用于周围环境特征频繁变化的动态环境。基于情境的服务组合模型的主要贡献在于:(1)提供了情境概念,明确了情境条件和情境服务之间的相互影响;(2)提供了一种适应机制,支持组合服务在特定情境下的规划和适应。
{"title":"A Situation-Based Service Composition Model for Dynamic Environments","authors":"H. Le","doi":"10.1109/3PGCIC.2011.59","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.59","url":null,"abstract":"This paper presents a situation-based service composition model for dynamic environments in which the characteristics of the surrounding environments are frequently changing. The main contribution of situation-based service composition model is: (1) to provide a concept of situations which specified the mutual affects of situated conditions and situated services, and (2) to provide an adaptation mechanism to support the planning and adaptation of composite services in specific situations.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122896621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework 基于身份验证和授权框架的云多租户数据库模式共享方法
S. Pippal, Vishu Sharma, Shakti Mishra, D. S. Kushwaha
Software-as-a-Service (SaaS) is a service model for delivering application as cloud services over the internet on subscription basis to multiple clients. This has forced the use of shared databases termed as multitenant databases. Multitenancy refers to a technology where a single instance of application serves requests from multiple clients. The word Tenant refers to a single organization (eg. an Institution) or person. In our proposed approach, shared database shared schema approach has been proposed that offers larger number of tenants (Educational Institutions) per database server as the single database serves the database requirements of multiple Institutions. Authentication and authorization are prime requirements when dealing with multitenancy. Kerberos authentication protocol is used on the top of multitenant database for participating educational institution in a heterogeneous environment, where a tenant can also voluntarily participate in the data centre.
软件即服务(SaaS)是一种服务模型,用于将应用程序作为云服务通过互联网以订阅的方式交付给多个客户端。这迫使使用称为多租户数据库的共享数据库。多租户是指应用程序的单个实例为来自多个客户机的请求提供服务的一种技术。租户这个词指的是一个单一的组织(例如。(机构)或人。在我们提出的方法中,已经提出了共享数据库共享模式方法,该方法为每个数据库服务器提供更多的租户(教育机构),因为单个数据库服务于多个机构的数据库需求。身份验证和授权是处理多租户时的主要需求。Kerberos身份验证协议用于异构环境中参与的教育机构的多租户数据库,其中租户也可以自愿参与数据中心。
{"title":"An Efficient Schema Shared Approach for Cloud Based Multitenant Database with Authentication and Authorization Framework","authors":"S. Pippal, Vishu Sharma, Shakti Mishra, D. S. Kushwaha","doi":"10.1109/3PGCIC.2011.39","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.39","url":null,"abstract":"Software-as-a-Service (SaaS) is a service model for delivering application as cloud services over the internet on subscription basis to multiple clients. This has forced the use of shared databases termed as multitenant databases. Multitenancy refers to a technology where a single instance of application serves requests from multiple clients. The word Tenant refers to a single organization (eg. an Institution) or person. In our proposed approach, shared database shared schema approach has been proposed that offers larger number of tenants (Educational Institutions) per database server as the single database serves the database requirements of multiple Institutions. Authentication and authorization are prime requirements when dealing with multitenancy. Kerberos authentication protocol is used on the top of multitenant database for participating educational institution in a heterogeneous environment, where a tenant can also voluntarily participate in the data centre.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A Decentralized Resource Broker Model with Authorization and Authentication Based on Multiparty Key Agreement Protocol in Data Grids 数据网格中基于多方密钥协议的分权资源代理授权与认证模型
Wen-Chung Chiang, Chao-Tung Yang, Hsiu-Hsia Lin
Co-allocation is newly developed technology for downloading data files from multiple replicas by establishing multiple connections in parallel, thus improving performance over single-server transfers and helping to alleviate the internet congestion problem. Schemes including our previous the anticipative recursively adjusting mechanism plus (ARAM+) model based on co-allocation strategies and resource broker which provides capabilities such as service allocating, resource discovery, job scheduling, job monitoring and data access to users~{!/~} application have been proposed. However, the challenges to the resource broker architectures are bottleneck and single point of failure for file transfer. Moreover, the secure intra-grid communication against internal attacks is another important issue. To overcome these problems, we present a new fully decentralized resource broker model with authorization and authentication based on co-allocation method for redundant parallel file transfer in Data Grid. We design and implement a resource broker agent, calling ~{!0~}light broker~{!1~} to share the workload of resource broker. We also propose a multiparty key agreement protocol to provide a secure resource group communication. The experimental results demonstrate that, our approach achieves dependable performance with various loads of services, broker failures and possible attacks.
协同分配是一种新开发的技术,通过并行建立多个连接,从多个副本下载数据文件,从而提高单服务器传输的性能,并有助于缓解互联网拥塞问题。方案包括我们之前基于共同分配策略和资源代理的预期递归调整机制+ (ARAM+)模型,它提供了服务分配、资源发现、作业调度、作业监控和用户数据访问等功能~{!/~}应用程序已被提出。然而,资源代理体系结构面临的挑战是瓶颈和文件传输的单点故障。此外,防止内部攻击的网格内安全通信是另一个重要问题。为了克服这些问题,我们提出了一种新的完全分散的资源代理模型,该模型基于数据网格中冗余并行文件传输的协同分配方法,具有授权和认证功能。我们设计并实现了一个资源代理,调用~{!0 ~}光代理~ {!1~}来分担资源代理的工作负载。我们还提出了一个多方密钥协议,以提供安全的资源组通信。实验结果表明,该方法在各种服务负载、代理故障和可能的攻击情况下都能实现可靠的性能。
{"title":"A Decentralized Resource Broker Model with Authorization and Authentication Based on Multiparty Key Agreement Protocol in Data Grids","authors":"Wen-Chung Chiang, Chao-Tung Yang, Hsiu-Hsia Lin","doi":"10.1109/3PGCIC.2011.11","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.11","url":null,"abstract":"Co-allocation is newly developed technology for downloading data files from multiple replicas by establishing multiple connections in parallel, thus improving performance over single-server transfers and helping to alleviate the internet congestion problem. Schemes including our previous the anticipative recursively adjusting mechanism plus (ARAM+) model based on co-allocation strategies and resource broker which provides capabilities such as service allocating, resource discovery, job scheduling, job monitoring and data access to users~{!/~} application have been proposed. However, the challenges to the resource broker architectures are bottleneck and single point of failure for file transfer. Moreover, the secure intra-grid communication against internal attacks is another important issue. To overcome these problems, we present a new fully decentralized resource broker model with authorization and authentication based on co-allocation method for redundant parallel file transfer in Data Grid. We design and implement a resource broker agent, calling ~{!0~}light broker~{!1~} to share the workload of resource broker. We also propose a multiparty key agreement protocol to provide a secure resource group communication. The experimental results demonstrate that, our approach achieves dependable performance with various loads of services, broker failures and possible attacks.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127554837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues 无线手持设备与云架构的集成:安全和隐私问题
M. Morshed, Mohammad Maynul Islam, Mohammad Kamrul Huq, Md. Shahadat Hossain, Mohammad Ariful Basher
Use of wireless hand held devices like mobile, PDA, laptop etc. is increasing rapidly. Many advanced users want more functionality with these wireless devices to manage their daily schedule. But most of the wireless hand-held devices have limited resource capability for robust functionality. Therefore cloud computing environment could be an alternative solution for these devices to support resource consuming applications. If the wireless hand held device is connected with the cloud, user can use more resource consuming applications and private data (stored in the cloud) from those devices. But privacy and security of the personal information and data make the user concern for using the cloud. The aim of the paper is to identify the security and privacy related risks and threats of the mass users as well as corporate users, if the wireless hand-held devices will be integrated with the cloud.
使用无线手持设备,如手机,PDA,笔记本电脑等正在迅速增加。许多高级用户希望这些无线设备具有更多功能来管理他们的日常计划。但大多数无线手持设备的资源能力有限,无法实现强大的功能。因此,云计算环境可以成为这些设备支持资源消耗应用程序的替代解决方案。如果无线手持设备与云连接,用户可以从这些设备中使用更多消耗资源的应用程序和私有数据(存储在云中)。但是个人信息和数据的隐私性和安全性让用户担心使用云。本文的目的是确定如果无线手持设备将与云集成,大众用户以及企业用户的安全和隐私相关风险和威胁。
{"title":"Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues","authors":"M. Morshed, Mohammad Maynul Islam, Mohammad Kamrul Huq, Md. Shahadat Hossain, Mohammad Ariful Basher","doi":"10.1109/3PGCIC.2011.22","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.22","url":null,"abstract":"Use of wireless hand held devices like mobile, PDA, laptop etc. is increasing rapidly. Many advanced users want more functionality with these wireless devices to manage their daily schedule. But most of the wireless hand-held devices have limited resource capability for robust functionality. Therefore cloud computing environment could be an alternative solution for these devices to support resource consuming applications. If the wireless hand held device is connected with the cloud, user can use more resource consuming applications and private data (stored in the cloud) from those devices. But privacy and security of the personal information and data make the user concern for using the cloud. The aim of the paper is to identify the security and privacy related risks and threats of the mass users as well as corporate users, if the wireless hand-held devices will be integrated with the cloud.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114733789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Proposal of Overlay Cloud Computing System by Virtual Autonomous Network Configuration 基于虚拟自治网络配置的覆盖云计算系统方案
Noriki Uchida, Kazuo Takahata, Y. Shibata
Recently, technology of cloud computing has been rapidly developed, and it is expected to apply for various network services. Virtual technology is a part of significant technology which has been contributed for the development of cloud computing. Various virtual technologies such as virtual OS and VDE become very important for server and network management in these days. Furthermore, such a virtual technology becomes possible to provide efficient resource management or QoS with virtual network configuration. Thus, it will be important for network construction to provide hardware and software service in near future. Autonomous network configuration in virtual layer is one of such a service. Not only network configuration is constructed in physical layer, but also it should be constructed in virtual layer for providing optimal resource and QoS management. In this paper, Overlay Cloud Computing Service is proposed, and it is consisted of virtual autonomous network configuration in cloud computing service including various server and network services. In our proposal methods, first of all, there are various kinds of user policy such as eco mode, high power mode, and secure mode. Then, virtual network and server configuration is automatically held in virtual layer with the mode setting and hardware configuration. Besides, with observation values of network and server condition, virtual configuration is changed optimally. In this optimal configuration changes, Kalman filter is used for the calculation of network and server condition. Then, with the results of calculation, virtual network topology is changed. In this paper, first, introduction and cloud computing service is discussed. Then, our proposed Overlay Cloud Computing Service by autonomous network configuration is introduced. In the chapter, optimal control method by Kalman filter with observed values is also introduced. Finally, conclusion and future study is discussed.
近年来,云计算技术得到了迅速发展,有望应用于各种网络业务。虚拟技术是推动云计算发展的重要技术之一。虚拟操作系统和VDE等各种虚拟技术在服务器和网络管理中变得非常重要。此外,这种虚拟技术可以通过虚拟网络配置提供有效的资源管理或QoS。因此,在不久的将来,提供硬件和软件服务将是网络建设的重要内容。虚拟层自治网络配置就是这样一种服务。为了提供最优的资源和QoS管理,网络配置不仅要在物理层构造,而且要在虚拟层构造。本文提出了覆盖式云计算服务,它由云计算服务中的虚拟自治网络配置组成,包括各种服务器和网络服务。在我们提出的方法中,首先有多种用户策略,如生态模式、高功率模式、安全模式。然后,虚拟网络和服务器配置与模式设置和硬件配置一起自动保存在虚拟层中。此外,根据网络和服务器状况的观测值,实现虚拟配置的最优改变。在这种最优配置变化中,卡尔曼滤波用于网络和服务器条件的计算。然后,根据计算结果,对虚拟网络拓扑进行修改。本文首先对云计算服务进行了介绍和讨论。然后,介绍了我们提出的基于自治网络配置的覆盖云计算服务。在这一章中,还介绍了基于观测值的卡尔曼滤波最优控制方法。最后,对结论和未来研究进行了展望。
{"title":"Proposal of Overlay Cloud Computing System by Virtual Autonomous Network Configuration","authors":"Noriki Uchida, Kazuo Takahata, Y. Shibata","doi":"10.1109/3PGCIC.2011.56","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.56","url":null,"abstract":"Recently, technology of cloud computing has been rapidly developed, and it is expected to apply for various network services. Virtual technology is a part of significant technology which has been contributed for the development of cloud computing. Various virtual technologies such as virtual OS and VDE become very important for server and network management in these days. Furthermore, such a virtual technology becomes possible to provide efficient resource management or QoS with virtual network configuration. Thus, it will be important for network construction to provide hardware and software service in near future. Autonomous network configuration in virtual layer is one of such a service. Not only network configuration is constructed in physical layer, but also it should be constructed in virtual layer for providing optimal resource and QoS management. In this paper, Overlay Cloud Computing Service is proposed, and it is consisted of virtual autonomous network configuration in cloud computing service including various server and network services. In our proposal methods, first of all, there are various kinds of user policy such as eco mode, high power mode, and secure mode. Then, virtual network and server configuration is automatically held in virtual layer with the mode setting and hardware configuration. Besides, with observation values of network and server condition, virtual configuration is changed optimally. In this optimal configuration changes, Kalman filter is used for the calculation of network and server condition. Then, with the results of calculation, virtual network topology is changed. In this paper, first, introduction and cloud computing service is discussed. Then, our proposed Overlay Cloud Computing Service by autonomous network configuration is introduced. In the chapter, optimal control method by Kalman filter with observed values is also introduced. Finally, conclusion and future study is discussed.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130792441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Current Cloud Technologies Overview 当前云技术概述
E. Mocanu, M. Andreica, N. Tapus
The Cloud has emerged as the solution for fast application deployment and cheap and flexible private infrastructure replacement, as well as for providing scalable services over the internet. The current paper tries to provide an overview of the current technologies related to the Cloud, their features and interactions. The services and platforms used in the Cloud have their specific advantages and drawbacks which we try to capture. The overview describes private, proprietary as well as open Cloud frameworks.
云作为快速应用程序部署、廉价灵活的私有基础设施替换以及通过互联网提供可扩展服务的解决方案而出现。本文试图概述当前与云相关的技术、它们的特性和相互作用。云中使用的服务和平台有其特定的优点和缺点,我们试图捕捉这些优点和缺点。概述描述了私有的、专有的以及开放的云框架。
{"title":"Current Cloud Technologies Overview","authors":"E. Mocanu, M. Andreica, N. Tapus","doi":"10.1109/3PGCIC.2011.52","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.52","url":null,"abstract":"The Cloud has emerged as the solution for fast application deployment and cheap and flexible private infrastructure replacement, as well as for providing scalable services over the internet. The current paper tries to provide an overview of the current technologies related to the Cloud, their features and interactions. The services and platforms used in the Cloud have their specific advantages and drawbacks which we try to capture. The overview describes private, proprietary as well as open Cloud frameworks.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"50 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130971144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Random Walk Search on Concatenated Hop-Limited Trees Embedded into Unstructured P2Ps 嵌入非结构化p2p的连接跳限树的随机行走搜索
S. Shioda, Phouvieng Hieungmany
We propose a random-walk-based file search for unstructured P2P networks. In the proposal, each node keeps two pieces of information, one is the hop-limited routing tables, storing the route information to nodes within a small number (say n) hops from each node. The hop-limited routing table is substantially equivalent to the hop-limited shortest path tree, which is made of nodes within limited hop distance from the root. The other is the file list, which is an index over files kept by nodes within n hops from each node. To find a file, a node first checks its file list. If the requested file is found in the list, the node sends a file request message to the file owner, otherwise, it sends a file-search message to a randomly-selected leaf node on the hop-limited shortest path tree rooted at itself. Numerical examples show that our proposal has much smaller search latency and lower file-search failure ratio than the primitive random-walk-based search, while it wastes much less network bandwidth than network-broadcast-based searches.
我们提出了一种基于随机游动的非结构化P2P网络文件搜索方法。在该方案中,每个节点保留两条信息,一条是跳数限制的路由表,将路由信息存储到每个节点的小跳数(例如n)内的节点。跳数限制路由表实质上相当于跳数限制的最短路径树,它是由距离根有限跳数距离内的节点组成的。另一种是文件列表,它是对每个节点n跳内的节点保存的文件的索引。要查找文件,节点首先检查它的文件列表。如果在列表中找到请求的文件,则该节点向文件所有者发送文件请求消息,否则,它将向以自身为根的受限跳数最短路径树上随机选择的叶子节点发送文件搜索消息。数值算例表明,与原始的基于随机游动的搜索相比,该方法具有更小的搜索延迟和更低的文件搜索失败率,并且比基于网络广播的搜索浪费更少的网络带宽。
{"title":"Random Walk Search on Concatenated Hop-Limited Trees Embedded into Unstructured P2Ps","authors":"S. Shioda, Phouvieng Hieungmany","doi":"10.1109/3PGCIC.2011.17","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.17","url":null,"abstract":"We propose a random-walk-based file search for unstructured P2P networks. In the proposal, each node keeps two pieces of information, one is the hop-limited routing tables, storing the route information to nodes within a small number (say n) hops from each node. The hop-limited routing table is substantially equivalent to the hop-limited shortest path tree, which is made of nodes within limited hop distance from the root. The other is the file list, which is an index over files kept by nodes within n hops from each node. To find a file, a node first checks its file list. If the requested file is found in the list, the node sends a file request message to the file owner, otherwise, it sends a file-search message to a randomly-selected leaf node on the hop-limited shortest path tree rooted at itself. Numerical examples show that our proposal has much smaller search latency and lower file-search failure ratio than the primitive random-walk-based search, while it wastes much less network bandwidth than network-broadcast-based searches.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127861112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time Series Pattern Recognition via SoftComputing 基于软件计算的时间序列模式识别
M. Kotyrba, Z. Oplatková, E. Volná, R. Šenkeřík, Václav Kocian, M. Janošek
In this paper we develop two methods that are able to analyze and recognize patterns in time series. The first model is based on analytic programming (AP), which belongs to soft computing. AP is based as well as genetic programming on the set of functions, operators and so-called terminals, which are usually constants or independent variables. The second one uses an artificial neural network that is adapted by back propagation. Artificial neural networks are suitable for pattern recognition in time series mainly because of learning only from examples. There is no need to add additional information that could bring more confusion than recognition effect. Neural networks are able to generalize and are resistant to noise. On the other hand, it is generally not possible to determine exactly what a neural network learned and it is also hard to estimate possible recognition error. They are ideal especially when we do not have any other description of the observed series. This paper also includes experimental results of time series pattern recognition carried out with both mentioned methods, which have proven their suitability for this type of problem solving.
在本文中,我们开发了两种能够分析和识别时间序列模式的方法。第一个模型基于分析规划(AP),属于软计算范畴。AP和遗传规划一样,都是基于一组函数、运算符和所谓的终端,这些终端通常是常量或自变量。第二种方法使用了一种人工神经网络,该网络通过反向传播进行自适应。人工神经网络适合于时间序列的模式识别,主要是因为它只从实例中学习。没有必要添加额外的信息,这可能会带来比识别效果更大的混乱。神经网络具有泛化能力和抗噪声能力。另一方面,通常不可能确切地确定神经网络学习了什么,也很难估计可能的识别误差。它们是理想的,特别是当我们对观测序列没有任何其他描述时。本文还包括用上述两种方法进行的时间序列模式识别的实验结果,证明了它们适合于这类问题的解决。
{"title":"Time Series Pattern Recognition via SoftComputing","authors":"M. Kotyrba, Z. Oplatková, E. Volná, R. Šenkeřík, Václav Kocian, M. Janošek","doi":"10.1109/3PGCIC.2011.72","DOIUrl":"https://doi.org/10.1109/3PGCIC.2011.72","url":null,"abstract":"In this paper we develop two methods that are able to analyze and recognize patterns in time series. The first model is based on analytic programming (AP), which belongs to soft computing. AP is based as well as genetic programming on the set of functions, operators and so-called terminals, which are usually constants or independent variables. The second one uses an artificial neural network that is adapted by back propagation. Artificial neural networks are suitable for pattern recognition in time series mainly because of learning only from examples. There is no need to add additional information that could bring more confusion than recognition effect. Neural networks are able to generalize and are resistant to noise. On the other hand, it is generally not possible to determine exactly what a neural network learned and it is also hard to estimate possible recognition error. They are ideal especially when we do not have any other description of the observed series. This paper also includes experimental results of time series pattern recognition carried out with both mentioned methods, which have proven their suitability for this type of problem solving.","PeriodicalId":251730,"journal":{"name":"2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125228037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1