首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Passive Worm and Malware Detection in Peer-to-Peer Networks 点对点网络中的被动蠕虫和恶意软件检测
Sahar Fahimian, Amirvala Movahed, M. Kharrazi
Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our investigation, we crawl the Gnutella P2P network over a 12 day period collecting file names and file popularity statistics. We are then able to extract the highly popular files and identify worm/malware files within them with high accuracy.
今天,P2P网络负责互联网上的大量流量,因为许多互联网用户使用这种网络进行内容分发。同时,P2P网络容易受到Internet蠕虫等安全威胁,易于传播。互联网蠕虫和更普遍的恶意软件是网络安全社区主要关注的问题。在野外有许多不同类型的蠕虫,主要是根据它们如何发现和感染它们的新受害者(即主动,被动等)来分类的。本文基于P2P网络中文件的普及,研究了一种检测被动蠕虫和恶意软件的新方法。作为我们调查的一部分,我们在12天的时间内抓取Gnutella P2P网络,收集文件名和文件流行度统计数据。然后,我们能够提取高度流行的文件,并识别其中的蠕虫/恶意软件文件具有很高的准确性。
{"title":"Passive Worm and Malware Detection in Peer-to-Peer Networks","authors":"Sahar Fahimian, Amirvala Movahed, M. Kharrazi","doi":"10.1109/EUC.2010.133","DOIUrl":"https://doi.org/10.1109/EUC.2010.133","url":null,"abstract":"Today P2P networks are responsible for a large amount of traffic on the Internet, as many Internet users employ such networks for content distribution. At the same time, P2P networks are vulnerable to security threats such as Internet worms and facilitate their propagation. Internet worms and more generally malware are a major concern to the network security community. There are many different type of worms in the wild, mostly categorized based on how they find and infect their new victims (i.e. active, passive, etc.). In this paper, we investigate a new approach for detecting passive worms and malware in P2P networks based on the popularity of files in the network. As part of our investigation, we crawl the Gnutella P2P network over a 12 day period collecting file names and file popularity statistics. We are then able to extract the highly popular files and identify worm/malware files within them with high accuracy.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128064568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor Networks 基于IEEE 802.15.4的水声传感器网络自适应GTS分配方案
Jung-Il Namgung, S. Shin, N. Yun, Soo-Hyun Park
This paper proposes a new media access control (MAC) protocol, Preamble-MAC (P-MAC). P-MAC is adaptive and dynamic MAC protocol based on Virtual Distance Level (VDL), which is the estimated, accumulated information of channel status and variation obtained through periodically monitoring underwater environment information such as long, unknown propagation delays and low bandwidth for underwater acoustic sensor networks.
本文提出了一种新的媒体访问控制协议——pre -MAC (P-MAC)。P-MAC是一种基于虚拟距离等级(Virtual Distance Level, VDL)的自适应动态MAC协议,它是水声传感器网络通过定期监测水下环境信息(如长且未知的传播延迟和低带宽)获得的信道状态和变化的估计累积信息。
{"title":"Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor Networks","authors":"Jung-Il Namgung, S. Shin, N. Yun, Soo-Hyun Park","doi":"10.1109/EUC.2010.149","DOIUrl":"https://doi.org/10.1109/EUC.2010.149","url":null,"abstract":"This paper proposes a new media access control (MAC) protocol, Preamble-MAC (P-MAC). P-MAC is adaptive and dynamic MAC protocol based on Virtual Distance Level (VDL), which is the estimated, accumulated information of channel status and variation obtained through periodically monitoring underwater environment information such as long, unknown propagation delays and low bandwidth for underwater acoustic sensor networks.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User Virtualization UbiCloud:基于终端用户虚拟化的普适终端云计算系统
Yuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He
a cloud computing prototype system, UbiCloud, is developed to enable the ubiquitous terminals access to powerful and reliable computing resources anywhere and anytime through building a virtual computing environment between the front-end ubiquitous terminals and the back-end servers (cloud). The experiment results show that the system performance is good enough to support most applications deployment on resource- poor terminals.
开发了云计算原型系统UbiCloud,通过在前端无处不在的终端和后端服务器(云)之间构建虚拟计算环境,使无处不在的终端能够随时随地访问强大可靠的计算资源。实验结果表明,该系统的性能足以支持大多数应用程序在资源匮乏的终端上的部署。
{"title":"UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User Virtualization","authors":"Yuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He","doi":"10.1109/EUC.2010.150","DOIUrl":"https://doi.org/10.1109/EUC.2010.150","url":null,"abstract":"a cloud computing prototype system, UbiCloud, is developed to enable the ubiquitous terminals access to powerful and reliable computing resources anywhere and anytime through building a virtual computing environment between the front-end ubiquitous terminals and the back-end servers (cloud). The experiment results show that the system performance is good enough to support most applications deployment on resource- poor terminals.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134425130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature 降低峰值温度的三维芯片多处理器实时约束任务调度
Jiayin Li, Meikang Qiu, J. Niu, Tianzhou Chen, Yongxin Zhu
Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more functionalities and providing higher performance. The high temperature on chip is a critical issue for the 3D architecture. In this paper, we propose an online thermal prediction model for 3D chip. Using this model, we present a task scheduling algorithm based on rotation scheduling to reduce the peak temperature on chip. We consider the data dependencies, especially the inter-iteration dependencies which are not well considered in most of the current thermal-aware task scheduling algorithms. Our simulation result shows that our algorithm can efficiently reduce the peak temperature up to 10C.
芯片多处理器技术由于其巨大的计算需求而在嵌入式系统中得到了应用。三维芯片多处理器结构是集成更多功能和提供更高性能的研究热点。芯片上的高温是3D架构的一个关键问题。本文提出了一种三维芯片热在线预测模型。利用该模型,提出了一种基于旋转调度的任务调度算法,以降低芯片上的峰值温度。考虑了当前大多数热感知任务调度算法没有很好地考虑的数据依赖关系,特别是迭代间的依赖关系。仿真结果表明,该算法可以有效地将峰值温度降低到10C以下。
{"title":"Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature","authors":"Jiayin Li, Meikang Qiu, J. Niu, Tianzhou Chen, Yongxin Zhu","doi":"10.1109/EUC.2010.33","DOIUrl":"https://doi.org/10.1109/EUC.2010.33","url":null,"abstract":"Chip multiprocessor technique has been implemented in embedded systems due to the tremendous computation requirements. Three dimension chip multiprocessor architecture has been studied recently for integrating more functionalities and providing higher performance. The high temperature on chip is a critical issue for the 3D architecture. In this paper, we propose an online thermal prediction model for 3D chip. Using this model, we present a task scheduling algorithm based on rotation scheduling to reduce the peak temperature on chip. We consider the data dependencies, especially the inter-iteration dependencies which are not well considered in most of the current thermal-aware task scheduling algorithms. Our simulation result shows that our algorithm can efficiently reduce the peak temperature up to 10C.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130300166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making 基于多维模糊决策的移动Ad Hoc网络节点信任评估
Zhang Feng, Z. Jia, Li Xin, Xia Hui
Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All above makes it very difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition, we present a pattern of multi-dimensional fuzzy decision making with feedback. The analysis and experimental computation shows that this scheme is efficient in risk assessment of Ad hoc networks.
由于分布和自组织的特性,移动自组织网络依赖于节点间的合作来传递信息。因此,有效的选择下一个合作潜在节点的风险和信任评估方案是保证高通信质量的关键因素之一。信任模型是一个抽象的心理认知过程,是社会关系中最复杂的概念之一,涉及假设、期望和行为等因素。这些都给准确量化和预测信任带来了很大的困难。本文在模糊识别理论的基础上,提出了一种带有反馈的多维模糊决策模式。分析和实验计算表明,该方案对Ad hoc网络的风险评估是有效的。
{"title":"Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making","authors":"Zhang Feng, Z. Jia, Li Xin, Xia Hui","doi":"10.1109/EUC.2010.84","DOIUrl":"https://doi.org/10.1109/EUC.2010.84","url":null,"abstract":"Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All above makes it very difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition, we present a pattern of multi-dimensional fuzzy decision making with feedback. The analysis and experimental computation shows that this scheme is efficient in risk assessment of Ad hoc networks.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114180929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spray and Routing for Message Delivery in Challenged Networks 挑战网络中消息传递的喷雾和路由
Wanrong Yu, Chunqing Wu, Xiaofeng Hu
In the challenged networks, such as interplanetary networks, satellite networks, military networks and so on, a complete path from the source to the destination does not exist for most of the time. The lack of end-to-end path makes the message delivery a great challenge in these networks. In this paper, we propose the spray and routing message delivery mechanism, which combines the simplicity of epidemic routing and the efficiency of direct routing. We evaluate the performance of Spray and Routing via simulation using the ONE simulator, in comparison with the traditional Epidemic, Prophet and Spray and Waiting protocols. The simulation results show that our method can achieve better performance.
在面临挑战的网络中,如行星际网络、卫星网络、军事网络等,在大多数情况下,不存在从源到目的的完整路径。在这些网络中,缺乏端到端路径使得消息传递成为一个巨大的挑战。本文提出了一种结合了流行病路由的简单性和直接路由的高效性的喷雾路由消息传递机制。我们使用ONE模拟器对Spray and Routing的性能进行了仿真评估,并与传统的Epidemic、Prophet和Spray and Waiting协议进行了比较。仿真结果表明,该方法具有较好的性能。
{"title":"Spray and Routing for Message Delivery in Challenged Networks","authors":"Wanrong Yu, Chunqing Wu, Xiaofeng Hu","doi":"10.1109/EUC.2010.78","DOIUrl":"https://doi.org/10.1109/EUC.2010.78","url":null,"abstract":"In the challenged networks, such as interplanetary networks, satellite networks, military networks and so on, a complete path from the source to the destination does not exist for most of the time. The lack of end-to-end path makes the message delivery a great challenge in these networks. In this paper, we propose the spray and routing message delivery mechanism, which combines the simplicity of epidemic routing and the efficiency of direct routing. We evaluate the performance of Spray and Routing via simulation using the ONE simulator, in comparison with the traditional Epidemic, Prophet and Spray and Waiting protocols. The simulation results show that our method can achieve better performance.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115170710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case Study NoGAP中浮点加减法器的实现,比较案例研究
Per Karlström, Wenbiao Zhou, Dake Liu
Flexible Application Specific Instruction set Processors (ASIPs) are starting to replace monolithic ASICs in a wide variety of fields. However the construction of an ASIP is today associated with a substantial design effort. No GAP (Novel Generator of Micro Architecture and Processor) is a tool for ASIP design utilizing hardware multiplexed data paths. One of the main advantages of No GAP compared to other EDA tools for processor design, is that No GAP imposes few limits on the architecture and thus design freedom. To prove that No GAP can be used to design complex data paths a reimplementation of a floating point adder/subtracter previously implemented using Verilog with FPGA specific optimizations was reimplemented using the No GAP-CL. The adder/subtracter implemented in Verilog can operate at a frequency of 377 MHz in a Virtex-4SX35 (speed grade-12) as compared with the No GAP implementation which had a maximum operation frequency of 276 Mhz, using the hand optimized mantissa adder from the original Verilog code, the No GAP implementation reached timing closure at 326 Mhz.
灵活的专用指令集处理器(asip)开始在各种领域取代单片asic。然而,ASIP的构建今天与大量的设计工作联系在一起。No GAP (Novel Generator of microarchitecture and Processor)是一个利用硬件多路数据路径进行ASIP设计的工具。与其他用于处理器设计的EDA工具相比,No GAP的主要优点之一是,No GAP对体系结构施加的限制很少,因此设计自由。为了证明No GAP可以用于设计复杂的数据路径,使用No GAP- cl重新实现了先前使用Verilog实现的带有FPGA特定优化的浮点加/减法器。在Verilog中实现的加/减法器可以在Virtex-4SX35(速度等级12)中以377 MHz的频率工作,而No GAP实现的最大工作频率为276 MHz,使用原始Verilog代码中的手动优化尾数加法器,No GAP实现在326 MHz达到时序关闭。
{"title":"Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case Study","authors":"Per Karlström, Wenbiao Zhou, Dake Liu","doi":"10.1109/EUC.2010.20","DOIUrl":"https://doi.org/10.1109/EUC.2010.20","url":null,"abstract":"Flexible Application Specific Instruction set Processors (ASIPs) are starting to replace monolithic ASICs in a wide variety of fields. However the construction of an ASIP is today associated with a substantial design effort. No GAP (Novel Generator of Micro Architecture and Processor) is a tool for ASIP design utilizing hardware multiplexed data paths. One of the main advantages of No GAP compared to other EDA tools for processor design, is that No GAP imposes few limits on the architecture and thus design freedom. To prove that No GAP can be used to design complex data paths a reimplementation of a floating point adder/subtracter previously implemented using Verilog with FPGA specific optimizations was reimplemented using the No GAP-CL. The adder/subtracter implemented in Verilog can operate at a frequency of 377 MHz in a Virtex-4SX35 (speed grade-12) as compared with the No GAP implementation which had a maximum operation frequency of 276 Mhz, using the hand optimized mantissa adder from the original Verilog code, the No GAP implementation reached timing closure at 326 Mhz.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Robot Control Using an Underwater Acoustic Modem 基于水声调制解调器的机器人控制
Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim
Underwater sensor network (USN) enables various services implemented over terrestrial wireless sensor network previously and underwater robot control service is one of the applications of USN. For wirelessly controlling an underwater robot, development of an underwater acoustic modem for transmitting robot control frame as well as analysis of the robot control protocol should be carried out properly. In this paper, we have developed an underwater modem suitable for underwater robot control and designed a protocol to handle the robot. We have also verified the robot control system by experimenting in an underwater environment.
水下传感器网络(USN)使以前在地面无线传感器网络上实现的各种服务成为可能,水下机器人控制服务是USN的应用之一。为了实现水下机器人的无线控制,需要开发用于传输机器人控制帧的水声调制解调器,并对机器人控制协议进行分析。本文研制了一种适用于水下机器人控制的水下调制解调器,并设计了一种处理水下机器人的协议。我们还通过水下环境实验验证了机器人控制系统。
{"title":"Robot Control Using an Underwater Acoustic Modem","authors":"Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim","doi":"10.1109/EUC.2010.55","DOIUrl":"https://doi.org/10.1109/EUC.2010.55","url":null,"abstract":"Underwater sensor network (USN) enables various services implemented over terrestrial wireless sensor network previously and underwater robot control service is one of the applications of USN. For wirelessly controlling an underwater robot, development of an underwater acoustic modem for transmitting robot control frame as well as analysis of the robot control protocol should be carried out properly. In this paper, we have developed an underwater modem suitable for underwater robot control and designed a protocol to handle the robot. We have also verified the robot control system by experimenting in an underwater environment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams 在时空数据流上连续查询的GPU执行
Jonathan M. Cazalas, R. Guha
Much research exists for the efficient processing of spatio-temporal data streams. However, all methods ultimately rely on an ill-equipped processor [22], namely a CPU, to evaluate concurrent, continuous spatio-temporal queries over these data streams. This paper presents GEDS, a scalable, Graphics Processing Unit (GPU)-based framework for the evaluation of continuous spatio-temporal queries over spatio-temporal data streams. GEDS employs the computation sharing and parallel processing paradigms to deliver scalability in the evaluation of continuous spatio-temporal queries. The GEDS framework utilizes the parallel processing capability of the GPU, a stream processor by trade, to handle the computation required in this application. Experimental evaluation shows promising performance and shows the scalability and efficacy of GEDS in spatio-temporal data streaming environments.
针对时空数据流的高效处理,已有大量的研究。然而,所有的方法最终都依赖于一个装备不良的处理器[22],即CPU,来评估这些数据流上并发的、连续的时空查询。本文介绍了GEDS,一个可扩展的,基于图形处理单元(GPU)的框架,用于评估对时空数据流的连续时空查询。GEDS采用计算共享和并行处理的模式,在连续时空查询的评估中提供可扩展性。GEDS框架利用GPU的并行处理能力来处理该应用程序所需的计算。实验结果表明,该方法具有良好的性能,并显示了该方法在时空数据流环境下的可扩展性和有效性。
{"title":"GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams","authors":"Jonathan M. Cazalas, R. Guha","doi":"10.1109/EUC.2010.26","DOIUrl":"https://doi.org/10.1109/EUC.2010.26","url":null,"abstract":"Much research exists for the efficient processing of spatio-temporal data streams. However, all methods ultimately rely on an ill-equipped processor [22], namely a CPU, to evaluate concurrent, continuous spatio-temporal queries over these data streams. This paper presents GEDS, a scalable, Graphics Processing Unit (GPU)-based framework for the evaluation of continuous spatio-temporal queries over spatio-temporal data streams. GEDS employs the computation sharing and parallel processing paradigms to deliver scalability in the evaluation of continuous spatio-temporal queries. The GEDS framework utilizes the parallel processing capability of the GPU, a stream processor by trade, to handle the computation required in this application. Experimental evaluation shows promising performance and shows the scalability and efficacy of GEDS in spatio-temporal data streaming environments.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Formal Trust Specification in Service Workflows 服务工作流中的正式信任规范
W. Viriyasitavat, Andrew P. Martin
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution that fits into this context. This paper proposes a formal trust specification which covers a wide range of intuitive trust characteristics such as trust transitivity and mutual relationship. We develop a new trust definition and three modes of trust with algebraic operators to form specification formulas. A method for determining the closeness of a matched trust value on a service using Euclidean Distance is presented and the basic analysis is conducted.
互联网的出现改变了面对面的本质,变成了在线互动。这就产生了虚拟互操作的概念,例如Web服务、网格和云计算。由于现有的安全机制不足以覆盖工作流应用程序域的多样性,因此信任被视为适合此上下文的自适应、高级抽象和平台无关的解决方案。本文提出了一种涵盖信任传递性、相互关系等广泛直观信任特征的形式化信任规范。提出了一种新的信任定义和三种带代数算子的信任模式,形成了规范公式。提出了一种利用欧几里得距离确定服务上匹配信任值的接近度的方法,并进行了基本分析。
{"title":"Formal Trust Specification in Service Workflows","authors":"W. Viriyasitavat, Andrew P. Martin","doi":"10.1109/EUC.2010.111","DOIUrl":"https://doi.org/10.1109/EUC.2010.111","url":null,"abstract":"The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution that fits into this context. This paper proposes a formal trust specification which covers a wide range of intuitive trust characteristics such as trust transitivity and mutual relationship. We develop a new trust definition and three modes of trust with algebraic operators to form specification formulas. A method for determining the closeness of a matched trust value on a service using Euclidean Distance is presented and the basic analysis is conducted.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125158630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1