首页 > 最新文献

22nd International Conference on Advanced Information Networking and Applications (aina 2008)最新文献

英文 中文
Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments 基于红外的无线环境中的动态缓存失效方案
Yeim-Kuan Chang, Y. Ting, Tai-Hong Lin
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache invalidation report (IR) is proposed to deal with the cache consistency problem. However, the main drawback of IR-based schemes is the long latency of data access because the mobile hosts (MHs) need to wait next IR interval for cache invalidation when the cache hit happens. In this paper, we propose a dynamic invalidation report (DIR) to reduce the latency of data access when the MHs query data. DIR contains an early cache validation mechanism by utilizing the validation messages. Therefore, the MHs can verify their cached data as soon as possible. Next, we design a predictive method to dynamically adjust IR interval to further reduce the latency called DIR-AI (DIR with adjustable interval) scheme. Finally, we evaluate the performance of the DIR and DIR-AI and compare them with the existing invalidation report schemes by using NS2 (network simulator). The experimental results show that DIR reduces averagely 54.3% and 34.3% of latency; DIR-AI reduces averagely 57.35 and 38.6% of latency compared with TS (TimeStamp) and UIR (updated IR) schemes respectively.
由于移动性、能量消耗和带宽限制的影响,传统的缓存失效方案不适合在无线环境中使用。为了解决缓存一致性问题,提出了缓存失效报告(IR)。然而,基于IR的方案的主要缺点是数据访问的延迟时间长,因为当缓存命中发生时,移动主机(mh)需要等待下一个IR间隔来使缓存失效。在本文中,我们提出了一种动态失效报告(dynamic invalidation report, DIR)来减少mh查询数据时的数据访问延迟。DIR通过利用验证消息包含一个早期缓存验证机制。因此,mh可以尽快验证其缓存的数据。接下来,我们设计了一种动态调整红外间隔的预测方法,以进一步减少延迟,称为DIR- ai(可调间隔DIR)方案。最后,我们利用NS2(网络模拟器)评估了DIR和DIR- ai的性能,并将它们与现有的无效报告方案进行了比较。实验结果表明,DIR平均减少了54.3%和34.3%的延迟;与TS (TimeStamp)和UIR (updated IR)方案相比,DIR-AI分别平均减少57.35%和38.6%的延迟。
{"title":"Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments","authors":"Yeim-Kuan Chang, Y. Ting, Tai-Hong Lin","doi":"10.1109/AINA.2008.118","DOIUrl":"https://doi.org/10.1109/AINA.2008.118","url":null,"abstract":"Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache invalidation report (IR) is proposed to deal with the cache consistency problem. However, the main drawback of IR-based schemes is the long latency of data access because the mobile hosts (MHs) need to wait next IR interval for cache invalidation when the cache hit happens. In this paper, we propose a dynamic invalidation report (DIR) to reduce the latency of data access when the MHs query data. DIR contains an early cache validation mechanism by utilizing the validation messages. Therefore, the MHs can verify their cached data as soon as possible. Next, we design a predictive method to dynamically adjust IR interval to further reduce the latency called DIR-AI (DIR with adjustable interval) scheme. Finally, we evaluate the performance of the DIR and DIR-AI and compare them with the existing invalidation report schemes by using NS2 (network simulator). The experimental results show that DIR reduces averagely 54.3% and 34.3% of latency; DIR-AI reduces averagely 57.35 and 38.6% of latency compared with TS (TimeStamp) and UIR (updated IR) schemes respectively.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combine Personal Blog Functionalities with LMS Using Tools Interoperability Architecture 使用工具互操作性架构将个人博客功能与LMS结合起来
Jui-Hung Chen, T. Shih, Chun-Chia Wang, Shu-Wei Yeh, Chen-Yu Lee
Respecting related technologies within e-learning domain, the use of learning management system (LMS) has been considered as the most important and essential component. LMS can manage the curriculum learning content, learner's learning profile and learning process. However it lacks suitable study assistance functions and personalized interface. Accordingly LMS is hard to promote and to be utilized by learners. This paper proposed an integrated framework which combined the personal learning blog functionalities to LMS by using the tools interoperability (TI) architecture in order to develop the suitable learning functionalities and interface in LMS for learners. And we hope the TI-based blog functionalities which can be utilized by other LMS in order to improve the LMS utility rate and to prove the feasibility of TI-based blog system.
在电子学习领域的相关技术中,学习管理系统(LMS)的使用被认为是最重要和必不可少的组成部分。LMS可以对课程学习内容、学习者学习概况和学习过程进行管理。但缺乏合适的学习辅助功能和个性化界面。因此,LMS很难被学习者推广和利用。本文提出了一个集成框架,利用工具互操作性(TI)架构将个人学习博客功能与LMS相结合,以开发适合学习者的LMS学习功能和界面。并希望基于ti的博客功能可以被其他LMS所利用,以提高LMS的利用率,证明基于ti的博客系统的可行性。
{"title":"Combine Personal Blog Functionalities with LMS Using Tools Interoperability Architecture","authors":"Jui-Hung Chen, T. Shih, Chun-Chia Wang, Shu-Wei Yeh, Chen-Yu Lee","doi":"10.1109/AINA.2008.43","DOIUrl":"https://doi.org/10.1109/AINA.2008.43","url":null,"abstract":"Respecting related technologies within e-learning domain, the use of learning management system (LMS) has been considered as the most important and essential component. LMS can manage the curriculum learning content, learner's learning profile and learning process. However it lacks suitable study assistance functions and personalized interface. Accordingly LMS is hard to promote and to be utilized by learners. This paper proposed an integrated framework which combined the personal learning blog functionalities to LMS by using the tools interoperability (TI) architecture in order to develop the suitable learning functionalities and interface in LMS for learners. And we hope the TI-based blog functionalities which can be utilized by other LMS in order to improve the LMS utility rate and to prove the feasibility of TI-based blog system.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reasoning and Merging in XML Data Integration XML数据集成中的推理与合并
Zijing Tan, Wei Wang, Baile Shi
In this paper, we study the problem of making use of target constraints to integrate XML data from different sources under a target schema. We recognize that target constraints are necessary in data integration, as the constraints are essential part of data semantics, and should be satisfied by integrated data. When integrating data from multiple data sources with overlapping data, constraints can express data merging rules at the target as well. We give a general constraint model for XML to express target constraints, which extends the relational equality-generating and tuple- generating dependencies. We provide a chase method to reason about data in the integrated XML document based on target constraints, by inferring data values not given explicitly, and inserting new subtrees as necessary. Singleton and key constraints are used to uniquely specify a certain entity, as a rule for data merging in the integration.
在本文中,我们研究了在一个目标模式下利用目标约束来集成来自不同来源的XML数据的问题。我们认识到目标约束在数据集成中是必要的,因为目标约束是数据语义的重要组成部分,并且应该被集成的数据所满足。当集成来自多个数据源的数据和重叠数据时,约束也可以表示目标上的数据合并规则。我们给出了一个通用的XML约束模型来表达目标约束,它扩展了关系等式生成和元组生成依赖关系。我们提供了一种追踪方法,根据目标约束推断集成XML文档中的数据,方法是推断未显式给出的数据值,并在必要时插入新的子树。单例约束和键约束用于唯一地指定某个实体,作为集成中数据合并的规则。
{"title":"Reasoning and Merging in XML Data Integration","authors":"Zijing Tan, Wei Wang, Baile Shi","doi":"10.1109/AINA.2008.26","DOIUrl":"https://doi.org/10.1109/AINA.2008.26","url":null,"abstract":"In this paper, we study the problem of making use of target constraints to integrate XML data from different sources under a target schema. We recognize that target constraints are necessary in data integration, as the constraints are essential part of data semantics, and should be satisfied by integrated data. When integrating data from multiple data sources with overlapping data, constraints can express data merging rules at the target as well. We give a general constraint model for XML to express target constraints, which extends the relational equality-generating and tuple- generating dependencies. We provide a chase method to reason about data in the integrated XML document based on target constraints, by inferring data values not given explicitly, and inserting new subtrees as necessary. Singleton and key constraints are used to uniquely specify a certain entity, as a rule for data merging in the integration.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122651135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the Security Promise of a Digital Time-Stamp 增强数字时间戳的安全承诺
Pei-yih Ting, F. Chu
In this paper we present a trusted time-stamping service which issues time-stamps with enhanced security by a practical forward-secure proxy signature mechanism. This signature scheme provides a way to verify the validity of the delegation from the trusted time source through the common PKI certification hierarchy. The forward-security of this signature scheme provides better protection against key-exposure attack when time-stamping server gets inruded. The design of this signature scheme is tied closely to the time-stamping service based on hierarchical distributed time sources. The signature scheme is implemented with standard RSA signature and verification algorithms. The computation of signing and verification in providing the forward-security feature is absorbed into the proxy scheme. Only delegation and key-updating require minor extra computation. In addition, one safety assumption made implicitly in Krawczyk's forward-secure signature scheme is identified and eliminated such that the security of our scheme outperforms its predecessor.
本文提出了一种可信的时间戳服务,该服务通过一种实用的前向安全代理签名机制来提高时间戳的安全性。该签名方案提供了一种通过公共PKI认证层次结构来验证来自可信时间源的委托的有效性的方法。该签名方案的前向安全性可以在时间戳服务器受到入侵时更好地防止密钥暴露攻击。该签名方案的设计与基于分层分布式时间源的时间戳服务紧密相关。该签名方案采用标准的RSA签名和验证算法实现。在提供前向安全特性时,签名和验证的计算被吸收到代理方案中。只有委托和密钥更新需要少量的额外计算。此外,识别并消除了Krawczyk的前向安全签名方案中隐含的一个安全假设,从而使我们的方案的安全性优于其前身。
{"title":"Enhancing the Security Promise of a Digital Time-Stamp","authors":"Pei-yih Ting, F. Chu","doi":"10.1109/AINA.2008.111","DOIUrl":"https://doi.org/10.1109/AINA.2008.111","url":null,"abstract":"In this paper we present a trusted time-stamping service which issues time-stamps with enhanced security by a practical forward-secure proxy signature mechanism. This signature scheme provides a way to verify the validity of the delegation from the trusted time source through the common PKI certification hierarchy. The forward-security of this signature scheme provides better protection against key-exposure attack when time-stamping server gets inruded. The design of this signature scheme is tied closely to the time-stamping service based on hierarchical distributed time sources. The signature scheme is implemented with standard RSA signature and verification algorithms. The computation of signing and verification in providing the forward-security feature is absorbed into the proxy scheme. Only delegation and key-updating require minor extra computation. In addition, one safety assumption made implicitly in Krawczyk's forward-secure signature scheme is identified and eliminated such that the security of our scheme outperforms its predecessor.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch 基于预留的共享内存光包交换机中报文顺序的维护
Xiaoliang Wang, Xiaohong Jiang, S. Horiguchi
Shared-memory optical packet (SMOP) switch architecture is very promising for significantly reducing the amount of required optical memory, which is typically constructed from fiber delay lines (FDLs). The current reservation-based scheduling algorithms for SMOP switches can effectively utilize the FDLs and achieve a low packet loss rate by simply reserving the departure time for each arrival packet. It is notable, however, that such a simple scheduling scheme may introduce a significant packets out of order problem. In this paper, we first identify the two main sources of packets out of order in the current reservation-based SMOP switches. We then show that by introducing a "last-timestamp " variable and modifying the corresponding FDLs arrangement as well as the scheduling process in the current reservation-based SMOP switches, it is possible to keep packets in-sequence while still maintaining a similar delay and packet loss performance as the previous design.
共享内存光分组(SMOP)交换体系结构非常有希望显著减少所需的光存储器数量,而光存储器通常由光纤延迟线(fdl)构成。现有的基于预留的SMOP交换机调度算法可以通过简单地为每个到达的数据包预留出发时间,有效地利用fdl,实现较低的丢包率。然而,值得注意的是,这样一个简单的调度方案可能会引入一个重要的数据包乱序问题。在本文中,我们首先确定了当前基于保留的SMOP交换机中数据包乱序的两个主要来源。然后,我们展示了通过引入“last-timestamp”变量并修改当前基于保留的SMOP交换机中相应的fdl安排以及调度过程,可以保持数据包的顺序,同时仍然保持与以前设计相似的延迟和丢包性能。
{"title":"Maintaining Packet Order in Reservation-Based Shared-Memory Optical Packet Switch","authors":"Xiaoliang Wang, Xiaohong Jiang, S. Horiguchi","doi":"10.1093/ietcom/e91-b.9.2889","DOIUrl":"https://doi.org/10.1093/ietcom/e91-b.9.2889","url":null,"abstract":"Shared-memory optical packet (SMOP) switch architecture is very promising for significantly reducing the amount of required optical memory, which is typically constructed from fiber delay lines (FDLs). The current reservation-based scheduling algorithms for SMOP switches can effectively utilize the FDLs and achieve a low packet loss rate by simply reserving the departure time for each arrival packet. It is notable, however, that such a simple scheduling scheme may introduce a significant packets out of order problem. In this paper, we first identify the two main sources of packets out of order in the current reservation-based SMOP switches. We then show that by introducing a \"last-timestamp \" variable and modifying the corresponding FDLs arrangement as well as the scheduling process in the current reservation-based SMOP switches, it is possible to keep packets in-sequence while still maintaining a similar delay and packet loss performance as the previous design.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114242986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
S2Directory A Framework for Object-Directory Mapping with Dynamic Implementation Injection 基于动态实现注入的对象-目录映射框架
Jun Futagawa, S. Yukita
Object models adopted in the object oriented software development reflect complex relations that exist between various entities in the real world. On the other hand, directory models adopted in directory service technologies map various relations into tree structures. Therefore, developing directory services by object oriented languages require writing lengthy procedures that bridge the gaps between object models and directory models. To overcome this drawback, in this paper, we propose a new technology named Object- Directory Mapping. We also present a Java based framework S2Directory to prove the effectiveness of the concept of Object-Directory Mapping. Implementation details are also given together with new dynamic implementation injection techniques.
面向对象软件开发中采用的对象模型反映了现实世界中各种实体之间存在的复杂关系。另一方面,目录服务技术中采用的目录模型将各种关系映射成树状结构。因此,使用面向对象语言开发目录服务需要编写冗长的过程,以弥合对象模型和目录模型之间的差距。为了克服这一缺点,本文提出了一种新的对象目录映射技术。我们还提出了一个基于Java的框架S2Directory来证明对象目录映射概念的有效性。还给出了实现细节以及新的动态实现注入技术。
{"title":"S2Directory A Framework for Object-Directory Mapping with Dynamic Implementation Injection","authors":"Jun Futagawa, S. Yukita","doi":"10.1109/AINA.2008.35","DOIUrl":"https://doi.org/10.1109/AINA.2008.35","url":null,"abstract":"Object models adopted in the object oriented software development reflect complex relations that exist between various entities in the real world. On the other hand, directory models adopted in directory service technologies map various relations into tree structures. Therefore, developing directory services by object oriented languages require writing lengthy procedures that bridge the gaps between object models and directory models. To overcome this drawback, in this paper, we propose a new technology named Object- Directory Mapping. We also present a Java based framework S2Directory to prove the effectiveness of the concept of Object-Directory Mapping. Implementation details are also given together with new dynamic implementation injection techniques.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114924998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effort to Understand the Optimal Routing Performance in Wireless Sensor Network 无线传感器网络中最优路由性能的研究
Qinghua Wang, Tingting Zhang, S. Pettersson
Wireless sensor network is remarkable for its promising use on human-unattended information collection, such as forest fire monitoring. In order to support efficient communication, many routing algorithms specially designed for such networks have been proposed. However, there is no idea about whether these proposed routing algorithms are already good enough or still have a long way to become "perfect", since there is currently a lack of understanding about the optimal routing performance. This paper makes a progress in the understanding of the optimal routing performance. Metrics here used to measure the routing performance are the network lifetime finally acquired and the total information finally collected. The condition used to judge the network's death is defined by the user's requirement on the guaranteed network information collecting ability. Optimization models based on the metrics and death condition mentioned above are proposed. Experiments show some existing routing proposals already work well when the user's requirement is strict, but few of them satisfy when the user's requirement is loose.
无线传感器网络在森林火灾监测等无人值守信息采集方面具有重要的应用前景。为了支持有效的通信,已经提出了许多专门为这种网络设计的路由算法。然而,由于目前缺乏对最优路由性能的理解,这些提出的路由算法是否已经足够好,或者还有很长的路要走到“完美”,我们还不知道。本文在理解最优路由性能方面取得了进展。这里用来衡量路由性能的指标是最终获得的网络生命周期和最终收集的总信息。判断网络死亡的条件由用户对保证网络信息收集能力的要求来确定。提出了基于上述指标和死亡条件的优化模型。实验表明,现有的一些路由方案在用户要求较严的情况下能够很好地满足用户要求,但在用户要求较松的情况下却很少能满足用户要求。
{"title":"An Effort to Understand the Optimal Routing Performance in Wireless Sensor Network","authors":"Qinghua Wang, Tingting Zhang, S. Pettersson","doi":"10.1109/AINA.2008.47","DOIUrl":"https://doi.org/10.1109/AINA.2008.47","url":null,"abstract":"Wireless sensor network is remarkable for its promising use on human-unattended information collection, such as forest fire monitoring. In order to support efficient communication, many routing algorithms specially designed for such networks have been proposed. However, there is no idea about whether these proposed routing algorithms are already good enough or still have a long way to become \"perfect\", since there is currently a lack of understanding about the optimal routing performance. This paper makes a progress in the understanding of the optimal routing performance. Metrics here used to measure the routing performance are the network lifetime finally acquired and the total information finally collected. The condition used to judge the network's death is defined by the user's requirement on the guaranteed network information collecting ability. Optimization models based on the metrics and death condition mentioned above are proposed. Experiments show some existing routing proposals already work well when the user's requirement is strict, but few of them satisfy when the user's requirement is loose.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Comparison of Virtualization Technologies for HPC HPC虚拟化技术的比较
J. Walters, V. Chaudhary, Minsuk Cha, Salvatore J. Guercio, S. Gallo
Virtualization is a common strategy for improving the utilization of existing computing resources, particularly within data centers. However, its use for high performance computing (HPC) applications is currently limited despite its potential for both improving resource utilization as well as providing resource guarantees to its users. This paper systematically evaluates various VMs for computationally intensive HPC applications using various standard benchmarks. Using VMWare Server, xen, and OpenVZ we examine the suitability of full virtualization, paravirtualization, and operating system-level virtualization in terms of network utilization SMP performance, file system performance, and MPI scalability. We show that the operating system-level virtualization provided by OpenVZ provides the best overall performance, particularly for MPI scalability.
虚拟化是提高现有计算资源利用率的常用策略,特别是在数据中心内。然而,它在高性能计算(HPC)应用程序中的使用目前受到限制,尽管它在提高资源利用率和为用户提供资源保证方面具有潜力。本文使用各种标准基准系统地评估了用于计算密集型HPC应用的各种vm。使用VMWare Server、xen和OpenVZ,我们在网络利用率、SMP性能、文件系统性能和MPI可伸缩性方面检查了完全虚拟化、半虚拟化和操作系统级虚拟化的适用性。我们展示了OpenVZ提供的操作系统级虚拟化提供了最佳的整体性能,特别是对于MPI可伸缩性。
{"title":"A Comparison of Virtualization Technologies for HPC","authors":"J. Walters, V. Chaudhary, Minsuk Cha, Salvatore J. Guercio, S. Gallo","doi":"10.1109/AINA.2008.45","DOIUrl":"https://doi.org/10.1109/AINA.2008.45","url":null,"abstract":"Virtualization is a common strategy for improving the utilization of existing computing resources, particularly within data centers. However, its use for high performance computing (HPC) applications is currently limited despite its potential for both improving resource utilization as well as providing resource guarantees to its users. This paper systematically evaluates various VMs for computationally intensive HPC applications using various standard benchmarks. Using VMWare Server, xen, and OpenVZ we examine the suitability of full virtualization, paravirtualization, and operating system-level virtualization in terms of network utilization SMP performance, file system performance, and MPI scalability. We show that the operating system-level virtualization provided by OpenVZ provides the best overall performance, particularly for MPI scalability.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123443565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 161
Supporting Live Video on Ad Hoc Wireless Networks: Unbalanced Multiple Description Coding, Single Path Transport and Recursive Error Concealment 支持自组织无线网络上的实时视频:不平衡多描述编码、单路径传输和递归错误隐藏
F. Huang, Lifeng Sun, Bin Li, Y. Zhong
Robust transmission of live video over ad hoc wireless networks presents new challenges: high bandwidth requirements are coupled with delay constraints; nodes are constrained in processing power and storage capacity; ad hoc wireless networks suffer from bursty packet losses that drastically degrade the viewing experience. Accordingly, we propose a simple, but practical unbalanced multiple description (UMD) codec that uses single path transport only. At the UMD decoder, the lost Low- Resolution (LR) frames can be receded from the corresponding ones of the correctly received High- Resolution (HR) stream. This makes LR more robust to packet losses and ensures continuous video playback. The simulation results show that the proposed UMD codec has higher decoded quality, smaller quality fluctuation and lower probability of pause than other error resilience techniques, especially when channel burstiness becomes large. We also propose a novel sequence-based error concealment (EC) algorithm for our UMD decoder. It recursively uses multi-frame recovery principle to frame-by-frame reduce error drift in the HR description with respect to the LR description. In fact, the algorithm can be applied to most UMD schemes. It has the advantage of working on integer-, half- or quarter- pixel precision and looking backward without buffering future frames. Experimental results show that error decreases the fastest if the UMD decoder uses our EC algorithm. It can provide satisfactory performance on both objective and subjective evaluation.
在自组织无线网络上进行实时视频的鲁棒传输提出了新的挑战:高带宽要求与延迟限制相结合;节点在处理能力和存储容量方面受到限制;自组织无线网络遭受突发数据包丢失,这大大降低了观看体验。因此,我们提出了一种简单但实用的非平衡多重描述(UMD)编解码器,它只使用单路径传输。在UMD解码器中,丢失的低分辨率(LR)帧可以从正确接收的高分辨率(HR)流的相应帧中退退。这使得LR对数据包丢失更加稳健,并确保连续视频播放。仿真结果表明,与其他抗干扰技术相比,所提出的UMD编解码器具有更高的解码质量、更小的质量波动和更低的暂停概率,特别是在信道突发较大的情况下。我们还为我们的UMD解码器提出了一种新的基于序列的错误隐藏算法。它递归地利用多帧恢复原理,逐帧减少HR描述相对于LR描述的误差漂移。实际上,该算法可以应用于大多数UMD方案。它的优点是工作在整数、半像素或四分之一像素的精度上,并且在不缓冲未来帧的情况下向后看。实验结果表明,当UMD解码器采用EC算法时,误差降低速度最快。它在客观和主观评价上都能提供令人满意的表现。
{"title":"Supporting Live Video on Ad Hoc Wireless Networks: Unbalanced Multiple Description Coding, Single Path Transport and Recursive Error Concealment","authors":"F. Huang, Lifeng Sun, Bin Li, Y. Zhong","doi":"10.1109/AINA.2008.136","DOIUrl":"https://doi.org/10.1109/AINA.2008.136","url":null,"abstract":"Robust transmission of live video over ad hoc wireless networks presents new challenges: high bandwidth requirements are coupled with delay constraints; nodes are constrained in processing power and storage capacity; ad hoc wireless networks suffer from bursty packet losses that drastically degrade the viewing experience. Accordingly, we propose a simple, but practical unbalanced multiple description (UMD) codec that uses single path transport only. At the UMD decoder, the lost Low- Resolution (LR) frames can be receded from the corresponding ones of the correctly received High- Resolution (HR) stream. This makes LR more robust to packet losses and ensures continuous video playback. The simulation results show that the proposed UMD codec has higher decoded quality, smaller quality fluctuation and lower probability of pause than other error resilience techniques, especially when channel burstiness becomes large. We also propose a novel sequence-based error concealment (EC) algorithm for our UMD decoder. It recursively uses multi-frame recovery principle to frame-by-frame reduce error drift in the HR description with respect to the LR description. In fact, the algorithm can be applied to most UMD schemes. It has the advantage of working on integer-, half- or quarter- pixel precision and looking backward without buffering future frames. Experimental results show that error decreases the fastest if the UMD decoder uses our EC algorithm. It can provide satisfactory performance on both objective and subjective evaluation.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121857545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Study of Voice over IP Services over Broadband Wireless Networks 宽带无线网络上IP语音业务的实验研究
Edwin W. C. Peh, Winston K.G. Seah, Y. Chew, Y. Ge
In this paper, a hybrid network consisting of both WiMAX and WiFi links is set up and used as a testbed for Voice-over-IP (VoIP) performance studies. Relevant metrics are defined and used to analyse the performance of this hybrid network and its ability to support VoIP calls. End-to-end delay and packets loss are measured as a function of number of ongoing VoIP calls. Based on these measured results, we propose a procedure to evaluate the maximum number of ongoing calls can be supported by the hybrid network while maintain the call quality at the desired level using the ITU-T specified E-model. The experimental studies show that this hybrid network is capable of supporting real-time VoIP calls, and that the network is able to support up to 12 simultaneous G.711-based VoIP calls and more than 20 simultaneous G.729-based VoIP calls. While it remains a challenge to ascertain the exact reasons behind the low network utilization, the proposed procedure for determining the maximum number of VoIP calls which meet the QoS requirements will be useful and valuable to service providers with the intention to provide VoIP services over such hybrid networks that interoperate these two technologies in the near future.
本文建立了一个由WiMAX和WiFi链路组成的混合网络,并将其用作ip语音(VoIP)性能研究的测试平台。定义并使用相关指标来分析这种混合网络的性能及其支持VoIP呼叫的能力。端到端延迟和丢包是作为正在进行的VoIP呼叫数的函数来测量的。基于这些测量结果,我们提出了一种程序来评估混合网络可以支持的最大通话数,同时使用ITU-T指定的E-model将通话质量保持在所需水平。实验研究表明,该混合网络能够支持实时VoIP呼叫,最多可同时支持12个基于g .711的VoIP呼叫和20个以上基于g .729的VoIP呼叫。虽然确定低网络利用率背后的确切原因仍然是一项挑战,但确定符合QoS要求的VoIP呼叫的最大数量的拟议程序对于打算在不久的将来在这两种技术互操作的混合网络上提供VoIP服务的服务提供商将是有用和有价值的。
{"title":"Experimental Study of Voice over IP Services over Broadband Wireless Networks","authors":"Edwin W. C. Peh, Winston K.G. Seah, Y. Chew, Y. Ge","doi":"10.1109/AINA.2008.65","DOIUrl":"https://doi.org/10.1109/AINA.2008.65","url":null,"abstract":"In this paper, a hybrid network consisting of both WiMAX and WiFi links is set up and used as a testbed for Voice-over-IP (VoIP) performance studies. Relevant metrics are defined and used to analyse the performance of this hybrid network and its ability to support VoIP calls. End-to-end delay and packets loss are measured as a function of number of ongoing VoIP calls. Based on these measured results, we propose a procedure to evaluate the maximum number of ongoing calls can be supported by the hybrid network while maintain the call quality at the desired level using the ITU-T specified E-model. The experimental studies show that this hybrid network is capable of supporting real-time VoIP calls, and that the network is able to support up to 12 simultaneous G.711-based VoIP calls and more than 20 simultaneous G.729-based VoIP calls. While it remains a challenge to ascertain the exact reasons behind the low network utilization, the proposed procedure for determining the maximum number of VoIP calls which meet the QoS requirements will be useful and valuable to service providers with the intention to provide VoIP services over such hybrid networks that interoperate these two technologies in the near future.","PeriodicalId":328651,"journal":{"name":"22nd International Conference on Advanced Information Networking and Applications (aina 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121765101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
22nd International Conference on Advanced Information Networking and Applications (aina 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1