首页 > 最新文献

2010 Ninth IEEE International Symposium on Network Computing and Applications最新文献

英文 中文
Improving Conjunctive Query Routing in Unstructured P2P Networks 非结构化P2P网络中联合查询路由的改进
Wai Gen Yee, L. Nguyen, O. Frieder
Approximately 74% of queries in peer-to-peer file sharing systems return no results, wasting both network bandwidth and computational resources. Considering the popularity of this application, this is a significant problem. We propose to improve the accuracy of query routing by improving how file collections are described and defining how peers organize into groups. Our basic approach is to improve the precision of collection description by having each peer partition its collection and describe each collection independently. Experimental results on real peer-to-peer file sharing data shows that our techniques can reduce routing cost to peer groups by 40% with near-perfect load balance.
在点对点文件共享系统中,大约74%的查询没有返回结果,这既浪费了网络带宽,也浪费了计算资源。考虑到这个应用程序的流行程度,这是一个严重的问题。我们建议通过改进文件集合的描述方式和定义对等体组织成组的方式来提高查询路由的准确性。我们的基本方法是通过让每个对等体划分其集合并独立描述每个集合来提高集合描述的精度。在真实的点对点文件共享数据上的实验结果表明,我们的技术可以在接近完美的负载平衡的情况下将对等组的路由成本降低40%。
{"title":"Improving Conjunctive Query Routing in Unstructured P2P Networks","authors":"Wai Gen Yee, L. Nguyen, O. Frieder","doi":"10.1109/NCA.2010.26","DOIUrl":"https://doi.org/10.1109/NCA.2010.26","url":null,"abstract":"Approximately 74% of queries in peer-to-peer file sharing systems return no results, wasting both network bandwidth and computational resources. Considering the popularity of this application, this is a significant problem. We propose to improve the accuracy of query routing by improving how file collections are described and defining how peers organize into groups. Our basic approach is to improve the precision of collection description by having each peer partition its collection and describe each collection independently. Experimental results on real peer-to-peer file sharing data shows that our techniques can reduce routing cost to peer groups by 40% with near-perfect load balance.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Network Based Approach to Malware Detection in Large IT Infrastructures 大型IT基础设施中基于网络的恶意软件检测方法
B. Kumar, C. Katsinis
Malware is code that has malicious intent and is designed for malicious purpose such as stealing confidential data, or obtaining root privileges on a system. The current approach to deal with malware threats such as virus and spyware is to use host based anti-malware software. However, this approach leads to many vulnerable machines since many users don't update their software, their virus signatures, and some even disable their software to avoid the system performance degradation caused by these software. Host based security software require a good deal of administration, with consistent needs for reconfiguration, management, and report analysis. With security administrators supporting an ever growing number of users, such an approach has become impractical. In this paper, we present a novel network based malware detection architecture that uses host security vectors to protect host machines without any intervention from hosts. This architecture provides another layer of security and can complement existing host based solutions. Only central detection server needs to be actively managed instead of individual hosts - hence providing more manageable solution for large IT infrastructures.
恶意软件是具有恶意意图的代码,用于窃取机密数据或获取系统的根权限等恶意目的。目前处理病毒和间谍软件等恶意软件威胁的方法是使用基于主机的反恶意软件。然而,这种方法导致许多易受攻击的机器,因为许多用户不更新他们的软件,他们的病毒签名,有些甚至禁用他们的软件,以避免这些软件造成的系统性能下降。基于主机的安全软件需要大量的管理工作,对重新配置、管理和报告分析都有一致的需求。随着安全管理员支持越来越多的用户,这种方法变得不切实际。在本文中,我们提出了一种新的基于网络的恶意软件检测架构,该架构使用主机安全向量来保护主机,而不需要主机的任何干预。这种体系结构提供了另一层安全性,可以补充现有的基于主机的解决方案。只有中央检测服务器需要主动管理,而不是单独的主机——因此为大型IT基础设施提供了更易于管理的解决方案。
{"title":"A Network Based Approach to Malware Detection in Large IT Infrastructures","authors":"B. Kumar, C. Katsinis","doi":"10.1109/NCA.2010.33","DOIUrl":"https://doi.org/10.1109/NCA.2010.33","url":null,"abstract":"Malware is code that has malicious intent and is designed for malicious purpose such as stealing confidential data, or obtaining root privileges on a system. The current approach to deal with malware threats such as virus and spyware is to use host based anti-malware software. However, this approach leads to many vulnerable machines since many users don't update their software, their virus signatures, and some even disable their software to avoid the system performance degradation caused by these software. Host based security software require a good deal of administration, with consistent needs for reconfiguration, management, and report analysis. With security administrators supporting an ever growing number of users, such an approach has become impractical. In this paper, we present a novel network based malware detection architecture that uses host security vectors to protect host machines without any intervention from hosts. This architecture provides another layer of security and can complement existing host based solutions. Only central detection server needs to be actively managed instead of individual hosts - hence providing more manageable solution for large IT infrastructures.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud Applications 云下:一种新颖的内容可寻址数据框架,用于云并行化,以创建和虚拟化新型云应用程序
Amir H. Basirat, A. Amin, Asad I. Khan
Existing data management schemes in clouds are mainly based on Google File System (GFS) and MapReduce. Problems arise when data partitioning among numerous available nodes therein. This research paper explores new methods of partitioning and distributing data, that is, resource virtualization in cloud computing. Loosely-coupled associative computing techniques, which have so far not been considered for clouds, can provide the break through needed for their data management. Applications based on associative computing models can efficiently utilize the underlying hardware to scale up and down the system resources dynamically. In doing so, the main hurdle towards providing scalable partitioning and distribution of data in the clouds is removed, bringing forth a vastly superior solution for virtualizing data intensive applications and the system infrastructure to support pay on per-use basis.
现有的云数据管理方案主要基于Google File System (GFS)和MapReduce。当数据在其中的许多可用节点之间进行分区时,就会出现问题。本文探讨了云计算中数据分区和分布的新方法,即资源虚拟化。松耦合的关联计算技术迄今尚未被考虑用于云计算,但它可以为云数据管理提供所需的突破。基于关联计算模型的应用程序可以有效地利用底层硬件来动态地扩展和缩减系统资源。通过这样做,消除了在云中提供可伸缩分区和数据分发的主要障碍,为虚拟化数据密集型应用程序和系统基础设施提供了一个非常优越的解决方案,以支持按使用付费。
{"title":"Under the Cloud: A Novel Content Addressable Data Framework for Cloud Parallelization to Create and Virtualize New Breeds of Cloud Applications","authors":"Amir H. Basirat, A. Amin, Asad I. Khan","doi":"10.1109/NCA.2010.29","DOIUrl":"https://doi.org/10.1109/NCA.2010.29","url":null,"abstract":"Existing data management schemes in clouds are mainly based on Google File System (GFS) and MapReduce. Problems arise when data partitioning among numerous available nodes therein. This research paper explores new methods of partitioning and distributing data, that is, resource virtualization in cloud computing. Loosely-coupled associative computing techniques, which have so far not been considered for clouds, can provide the break through needed for their data management. Applications based on associative computing models can efficiently utilize the underlying hardware to scale up and down the system resources dynamically. In doing so, the main hurdle towards providing scalable partitioning and distribution of data in the clouds is removed, bringing forth a vastly superior solution for virtualizing data intensive applications and the system infrastructure to support pay on per-use basis.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115094681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Partition Participant Detector with Dynamic Paths in Mobile Networks 移动网络中具有动态路径的分区参与者检测器
L. Arantes, Pierre Sens, Gaël Thomas, D. Conan, Léon Lim
Mobile ad-hoc networks, MANETs, are self-organized and very dynamic systems where processes have no global knowledge of the system. In this paper, we propose a model that characterizes the dynamics of MANETs in the sense that it considers that paths between nodes are dynamically built and the system can have infinitely many processes but the network may present finite stable partitions. We also propose an algorithm that implements an eventually perfect partition participant detector PD which eventually detects the participant nodes of stable partitions.
移动自组织网络(manet)是自组织的非常动态的系统,其中的过程没有系统的全局知识。在本文中,我们提出了一个模型,该模型考虑到节点之间的路径是动态构建的,系统可以有无限多个进程,但网络可能呈现有限的稳定分区。我们还提出了一种实现最终完美分区参与检测器PD的算法,该算法最终检测稳定分区的参与节点。
{"title":"Partition Participant Detector with Dynamic Paths in Mobile Networks","authors":"L. Arantes, Pierre Sens, Gaël Thomas, D. Conan, Léon Lim","doi":"10.1109/NCA.2010.40","DOIUrl":"https://doi.org/10.1109/NCA.2010.40","url":null,"abstract":"Mobile ad-hoc networks, MANETs, are self-organized and very dynamic systems where processes have no global knowledge of the system. In this paper, we propose a model that characterizes the dynamics of MANETs in the sense that it considers that paths between nodes are dynamically built and the system can have infinitely many processes but the network may present finite stable partitions. We also propose an algorithm that implements an eventually perfect partition participant detector PD which eventually detects the participant nodes of stable partitions.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"3 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
GROK: A Practical System for Securing Group Communications GROK:一个实用的系统,以确保集团通信
Joseph A. Cooley, R. Khazan, Benjamin Fuller, G. Pickard
We have designed and implemented a general- purpose cryptographic building block, called GROK, for securing communication among groups of entities in networks composed of high-latency, low-bandwidth, intermittently connected links. During the process, we solved a number of non-trivial system problems. This paper describes these problems and our solutions, and motivates and justifies these solutions from three viewpoints: usability, efficiency, and security. The solutions described in this paper have been tempered by securing a widely-used group-oriented application, group text chat. We implemented a prototype extension to a popular text chat client called Pidgin and evaluated it in a real-world scenario. Based on our experiences, these solutions are useful to designers of group-oriented systems specifically, and secure systems in general.
我们设计并实现了一个通用的加密构建块,称为GROK,用于保护由高延迟,低带宽,间歇性连接的链路组成的网络中实体组之间的通信。在此过程中,我们解决了许多重要的系统问题。本文描述了这些问题和我们的解决方案,并从可用性、效率和安全性三个角度对这些解决方案进行了激励和论证。本文中描述的解决方案通过保护一个广泛使用的面向群组的应用程序——群组文本聊天得到了改进。我们实现了一个名为Pidgin的流行文本聊天客户端的原型扩展,并在实际场景中对其进行了评估。根据我们的经验,这些解决方案对面向组的系统的设计者特别有用,对一般的安全系统也很有用。
{"title":"GROK: A Practical System for Securing Group Communications","authors":"Joseph A. Cooley, R. Khazan, Benjamin Fuller, G. Pickard","doi":"10.1109/NCA.2010.20","DOIUrl":"https://doi.org/10.1109/NCA.2010.20","url":null,"abstract":"We have designed and implemented a general- purpose cryptographic building block, called GROK, for securing communication among groups of entities in networks composed of high-latency, low-bandwidth, intermittently connected links. During the process, we solved a number of non-trivial system problems. This paper describes these problems and our solutions, and motivates and justifies these solutions from three viewpoints: usability, efficiency, and security. The solutions described in this paper have been tempered by securing a widely-used group-oriented application, group text chat. We implemented a prototype extension to a popular text chat client called Pidgin and evaluated it in a real-world scenario. Based on our experiences, these solutions are useful to designers of group-oriented systems specifically, and secure systems in general.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127317223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detection of Performance Anomalies in Web-Based Applications web应用程序中性能异常的检测
J. Magalhães, L. Silva
Performance management and dependability are two of the fundamental issues in business-critical applications. The ability to detect the occurrence of performance failures and anomalies has raised the attention of researchers in the last years. It is in fact a difficult problem, since a visible change in the performance can result from some natural cause (e.g., workload variations, upgrades) or by some internal anomaly or fault that may end up in a performance failure or application crash. Distinguish between the two scenarios is the goal of the framework presented in this paper. Our framework is targeted for web-based and component-based applications. It makes use of AOP-based monitoring, data correlation techniques and time-series alignment algorithms to spot the occurrence of performance anomalies avoiding false alarms due to workload variations. The paper includes some experimental results that show the effectiveness of our techniques under the occurrence of dynamic workloads and some fault-load situations.
性能管理和可靠性是业务关键型应用程序中的两个基本问题。检测性能故障和异常发生的能力在过去几年中引起了研究人员的关注。这实际上是一个困难的问题,因为性能的明显变化可能是由一些自然原因(例如,工作负载变化、升级)或一些内部异常或故障引起的,这些异常或故障可能最终导致性能失败或应用程序崩溃。区分这两种场景是本文提出的框架的目标。我们的框架针对的是基于web和基于组件的应用程序。它利用基于aop的监视、数据相关技术和时间序列对齐算法来发现性能异常的发生,避免由于工作负载变化而产生假警报。实验结果表明,在动态负载和一些故障负载情况下,我们的方法是有效的。
{"title":"Detection of Performance Anomalies in Web-Based Applications","authors":"J. Magalhães, L. Silva","doi":"10.1109/NCA.2010.15","DOIUrl":"https://doi.org/10.1109/NCA.2010.15","url":null,"abstract":"Performance management and dependability are two of the fundamental issues in business-critical applications. The ability to detect the occurrence of performance failures and anomalies has raised the attention of researchers in the last years. It is in fact a difficult problem, since a visible change in the performance can result from some natural cause (e.g., workload variations, upgrades) or by some internal anomaly or fault that may end up in a performance failure or application crash. Distinguish between the two scenarios is the goal of the framework presented in this paper. Our framework is targeted for web-based and component-based applications. It makes use of AOP-based monitoring, data correlation techniques and time-series alignment algorithms to spot the occurrence of performance anomalies avoiding false alarms due to workload variations. The paper includes some experimental results that show the effectiveness of our techniques under the occurrence of dynamic workloads and some fault-load situations.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Location Awareness Rescue System: Support for Mountain Rescue Teams 位置感知救援系统:支持山地救援队
Panagiotis Georgopoulos, B. McCarthy, C. Edwards
Aiding the efficient collaboration and coordination of rescue teams is a difficult task especially in a mountainous region. Challenges emerge from quickly alerting and debriefing rescuers, to deploying them effectively, and also coordinating and monitoring them in the rural search domain. Knowing the exact location of the rescuers and vehicles involved in a mountain search and rescue mission is a key element for the successful progress of the mission and aids the mission coordinator, who usually stays at the headquarters, to take fast and informed decisions. In this paper we present the devised Location Awareness Rescue System that targets the aforementioned challenges, and provides location information and updates of the rescuers in a real time manner as they are deployed in the rescue domain overlaid onto interactive maps. The results from our tests show that our system is a proficient presence management solution that can provide precise location information by recovering from any periodic or total connectivity loss, and also improve and support mountain rescue teams leading to more effective and successful missions.
帮助救援队伍进行有效的协作和协调是一项艰巨的任务,特别是在山区。挑战从快速警报和询问救援人员,到有效部署救援人员,以及在农村搜索领域协调和监控救援人员。了解参与山区搜索和救援任务的救援人员和车辆的确切位置是任务顺利进行的一个关键因素,并有助于通常留在总部的特派团协调员迅速作出知情的决定。在本文中,我们提出了针对上述挑战设计的位置感知救援系统,并提供救援人员的位置信息和实时更新,因为他们被部署在覆盖在交互式地图上的救援领域。我们的测试结果表明,我们的系统是一个熟练的存在管理解决方案,可以通过从任何周期性或完全的连接丢失中恢复提供精确的位置信息,还可以改善和支持山地救援队,从而实现更有效和成功的任务。
{"title":"Location Awareness Rescue System: Support for Mountain Rescue Teams","authors":"Panagiotis Georgopoulos, B. McCarthy, C. Edwards","doi":"10.1109/NCA.2010.44","DOIUrl":"https://doi.org/10.1109/NCA.2010.44","url":null,"abstract":"Aiding the efficient collaboration and coordination of rescue teams is a difficult task especially in a mountainous region. Challenges emerge from quickly alerting and debriefing rescuers, to deploying them effectively, and also coordinating and monitoring them in the rural search domain. Knowing the exact location of the rescuers and vehicles involved in a mountain search and rescue mission is a key element for the successful progress of the mission and aids the mission coordinator, who usually stays at the headquarters, to take fast and informed decisions. In this paper we present the devised Location Awareness Rescue System that targets the aforementioned challenges, and provides location information and updates of the rescuers in a real time manner as they are deployed in the rescue domain overlaid onto interactive maps. The results from our tests show that our system is a proficient presence management solution that can provide precise location information by recovering from any periodic or total connectivity loss, and also improve and support mountain rescue teams leading to more effective and successful missions.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123705150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prediction of Job Resource Requirements for Deadline Schedulers to Manage High-Level SLAs on the Cloud 预测用于管理云上的高级sla的截止日期调度器的作业资源需求
Gemma Reig, Javier Alonso, Jordi Guitart
For a non IT expert to use services in the Cloud is more natural to negotiate the QoS with the provider in terms of service-level metrics --e.g. job deadlines-- instead of resource-level metrics --e.g. CPU MHz. However, current infrastructures only support resource-level metrics --e.g. CPU share and memory allocation-- and there is not a well-known mechanism to translate from service-level metrics to resource-level metrics. Moreover, the lack of precise information regarding the requirements of the services leads to an inefficient resource allocation --usually, providers allocate whole resources to prevent SLA violations. According to this, we propose a novel mechanism to overcome this translation problem using an online prediction system which includes a fast analytical predictor and an adaptive machine learning based predictor. We also show how a deadline scheduler could use these predictions to help providers to make the most of their resources. Our evaluation shows: i) that fast algorithms are able to make predictions with an 11% and 17% of relative error for the CPU and memory respectively; ii) the potential of using accurate predictions in the scheduling compared to simple yet well-known schedulers.
对于使用云服务的非IT专家来说,根据服务级别指标(例如作业截止日期)而不是资源级别指标(例如CPU MHz)与提供商协商QoS更为自然。然而,当前的基础设施只支持资源级指标——例如CPU共享和内存分配——并且没有一种众所周知的机制将服务级指标转换为资源级指标。此外,缺乏关于服务需求的精确信息会导致资源分配效率低下——通常,提供商分配整个资源以防止违反SLA。基于此,我们提出了一种新的机制来克服翻译问题,使用在线预测系统,该系统包括一个快速分析预测器和一个基于自适应机器学习的预测器。我们还展示了截止日期调度程序如何使用这些预测来帮助提供者充分利用其资源。我们的评估表明:i)快速算法能够以相对于CPU和内存分别为11%和17%的相对误差进行预测;Ii)与简单但众所周知的调度程序相比,在调度中使用准确预测的潜力。
{"title":"Prediction of Job Resource Requirements for Deadline Schedulers to Manage High-Level SLAs on the Cloud","authors":"Gemma Reig, Javier Alonso, Jordi Guitart","doi":"10.1109/NCA.2010.28","DOIUrl":"https://doi.org/10.1109/NCA.2010.28","url":null,"abstract":"For a non IT expert to use services in the Cloud is more natural to negotiate the QoS with the provider in terms of service-level metrics --e.g. job deadlines-- instead of resource-level metrics --e.g. CPU MHz. However, current infrastructures only support resource-level metrics --e.g. CPU share and memory allocation-- and there is not a well-known mechanism to translate from service-level metrics to resource-level metrics. Moreover, the lack of precise information regarding the requirements of the services leads to an inefficient resource allocation --usually, providers allocate whole resources to prevent SLA violations. According to this, we propose a novel mechanism to overcome this translation problem using an online prediction system which includes a fast analytical predictor and an adaptive machine learning based predictor. We also show how a deadline scheduler could use these predictions to help providers to make the most of their resources. Our evaluation shows: i) that fast algorithms are able to make predictions with an 11% and 17% of relative error for the CPU and memory respectively; ii) the potential of using accurate predictions in the scheduling compared to simple yet well-known schedulers.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Dynamic Web Service Composition Middleware: A New Approach for QoS Guarantees 动态Web服务组合中间件:一种新的QoS保证方法
B. Kuehne, J. C. Estrella, M. Peixoto, T. C. Tavares, R. Santana, M. J. Santana
This project presents modeling, prototyping and results of the middleware developed for Web service dynamic selection in Web services composition named DWSC-M (Dynamic Web Service Composition Middleware). DWSC-M’s main focus is to choose what Web services will be part of the composite Web services in runtime. The choose is made considering aspects of QoS - Quality of Service. To evalute this approach two algorithms for Web Services selection has been proposed and implemented: the first one uses Random Selection (RS) and the second one uses Euclidean Distance (ED) for the selection of services and considers for this purpose the QoS atributes requested by a client.
该项目展示了为Web服务组合中的Web服务动态选择而开发的中间件的建模、原型和结果,该中间件名为DWSC-M(动态Web服务组合中间件)。DWSC-M的主要关注点是在运行时选择哪些Web服务将成为组合Web服务的一部分。选择是考虑QoS -服务质量方面。为了评估这种方法,已经提出并实现了两种Web服务选择算法:第一个使用随机选择(RS),第二个使用欧几里得距离(ED)来选择服务,并为此考虑客户端请求的QoS属性。
{"title":"Dynamic Web Service Composition Middleware: A New Approach for QoS Guarantees","authors":"B. Kuehne, J. C. Estrella, M. Peixoto, T. C. Tavares, R. Santana, M. J. Santana","doi":"10.1109/NCA.2010.30","DOIUrl":"https://doi.org/10.1109/NCA.2010.30","url":null,"abstract":"This project presents modeling, prototyping and results of the middleware developed for Web service dynamic selection in Web services composition named DWSC-M (Dynamic Web Service Composition Middleware). DWSC-M’s main focus is to choose what Web services will be part of the composite Web services in runtime. The choose is made considering aspects of QoS - Quality of Service. To evalute this approach two algorithms for Web Services selection has been proposed and implemented: the first one uses Random Selection (RS) and the second one uses Euclidean Distance (ED) for the selection of services and considers for this purpose the QoS atributes requested by a client.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124839376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault-Tolerant Deadlock-Free Adaptive Routing for Any Set of Link and Node Failures in Multi-cores Systems 多核系统中任意链路和节点故障的容错无死锁自适应路由
Fabien Chaix, D. Avresky, N. Zergainoh, M. Nicolaidis
Future applications will require processors with many cores communicating through a regular interconnection network. Meanwhile, as the Deep submicron technology fore- shadows highly defective chips era, fault-tolerant designs become compulsory. In particular, the fault tolerance of a core interconnect is critical, and inevitably increases its complexity. In this paper, we present a novel adaptive routing algorithm that is able to route messages in the presence of any set of multiple nodes and links failures, as long as a path exists. Compared to the existing solutions, the proposed algorithm provides fault tolerance without using any routing table. It is scalable and can be applied to multicore chips with a 2D mesh core interconnect of any size. The algorithm is deadlock-free and avoids infinite looping in fault-free and faulty 2D meshes, based on Virtual Networks and Virtual Channels. We simulated the proposed algorithm using the worst case scenario, regarding the traffic patterns and the failure rate up to 40%. Experimentation results confirmed that the algorithm tolerates multiple failures even in the most extreme failure patterns. Additionally, we monitored the trade off between the fault tolerance and the average latency for faulty cases, as measurement of the performance degradation. The algorithm detects the interconnects partitioning and enables "preferred paths" for streaming applications.
未来的应用将需要多核处理器通过常规互连网络进行通信。同时,随着深亚微米技术在高缺陷芯片时代的来临,容错设计变得必不可少。其中,核心互连的容错性至关重要,不可避免地增加了其复杂性。在本文中,我们提出了一种新的自适应路由算法,只要存在路径,它就能够在存在任何多节点和链路故障的情况下路由消息。与现有算法相比,该算法在不使用路由表的情况下具有容错性。它是可扩展的,可以应用于任何尺寸的二维网格核心互连的多核芯片。该算法基于虚拟网络和虚拟通道,无死锁,避免了无故障和故障二维网格中的无限循环。我们使用最坏的情况来模拟所提出的算法,考虑到流量模式和高达40%的故障率。实验结果表明,即使在最极端的故障模式下,该算法也能容忍多次故障。此外,我们还监视了故障情况下容错性和平均延迟之间的权衡,作为性能下降的度量。该算法检测互连分区,并为流应用程序启用“首选路径”。
{"title":"Fault-Tolerant Deadlock-Free Adaptive Routing for Any Set of Link and Node Failures in Multi-cores Systems","authors":"Fabien Chaix, D. Avresky, N. Zergainoh, M. Nicolaidis","doi":"10.1109/NCA.2010.14","DOIUrl":"https://doi.org/10.1109/NCA.2010.14","url":null,"abstract":"Future applications will require processors with many cores communicating through a regular interconnection network. Meanwhile, as the Deep submicron technology fore- shadows highly defective chips era, fault-tolerant designs become compulsory. In particular, the fault tolerance of a core interconnect is critical, and inevitably increases its complexity. In this paper, we present a novel adaptive routing algorithm that is able to route messages in the presence of any set of multiple nodes and links failures, as long as a path exists. Compared to the existing solutions, the proposed algorithm provides fault tolerance without using any routing table. It is scalable and can be applied to multicore chips with a 2D mesh core interconnect of any size. The algorithm is deadlock-free and avoids infinite looping in fault-free and faulty 2D meshes, based on Virtual Networks and Virtual Channels. We simulated the proposed algorithm using the worst case scenario, regarding the traffic patterns and the failure rate up to 40%. Experimentation results confirmed that the algorithm tolerates multiple failures even in the most extreme failure patterns. Additionally, we monitored the trade off between the fault tolerance and the average latency for faulty cases, as measurement of the performance degradation. The algorithm detects the interconnects partitioning and enables \"preferred paths\" for streaming applications.","PeriodicalId":276374,"journal":{"name":"2010 Ninth IEEE International Symposium on Network Computing and Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129572076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
期刊
2010 Ninth IEEE International Symposium on Network Computing and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1