首页 > 最新文献

2009 IEEE International Symposium on Parallel and Distributed Processing with Applications最新文献

英文 中文
A Case Study: File Access Privacy Control Using Filter Hook Driver 案例研究:使用过滤器钩子驱动程序的文件访问隐私控制
A. He, T. Ohdaira
Sand-box security model is extremely useful for secure execution of untrusted applications. Many sand-box model based security systems proposed so far provide security by intercepting system calls invoked by applications and controlling their execution. However, a problem in existing sand-box based systems is the amount of overhead required for security checks performed after system call interception. In addition, it is difficult for computer novices to manage their security systems because the system settings are complex. In this paper, a function was proposed and implemented to monitor only the file access in Microsoft Windows environment. Test result shows that this function could protect files from unallowed access and then minimize the overhead of application execution time.
沙盒安全模型对于不受信任的应用程序的安全执行非常有用。目前提出的许多基于沙盒模型的安全系统通过拦截应用程序调用的系统调用并控制其执行来提供安全性。然而,现有基于沙盒的系统中的一个问题是,在系统调用拦截之后执行安全检查所需的开销。此外,由于系统设置复杂,计算机新手很难管理他们的安全系统。本文提出并实现了一个在Microsoft Windows环境下仅对文件访问进行监控的功能。测试结果表明,该函数可以保护文件免受不允许的访问,从而最大限度地减少应用程序执行时间的开销。
{"title":"A Case Study: File Access Privacy Control Using Filter Hook Driver","authors":"A. He, T. Ohdaira","doi":"10.1109/ISPA.2009.61","DOIUrl":"https://doi.org/10.1109/ISPA.2009.61","url":null,"abstract":"Sand-box security model is extremely useful for secure execution of untrusted applications. Many sand-box model based security systems proposed so far provide security by intercepting system calls invoked by applications and controlling their execution. However, a problem in existing sand-box based systems is the amount of overhead required for security checks performed after system call interception. In addition, it is difficult for computer novices to manage their security systems because the system settings are complex. In this paper, a function was proposed and implemented to monitor only the file access in Microsoft Windows environment. Test result shows that this function could protect files from unallowed access and then minimize the overhead of application execution time.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132712760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transport and Routing Redundancy for MANETs Robustness MANETs鲁棒性的传输和路由冗余
Amadou Baba Bagayoko, B. Paillassa, Cláudia Betous-Almeida
Redundancy is the key notion to bring robustness in the highly dynamic environment of the ad hoc network. Traditionally, the reactive MANET routing protocol brings repair process after a route failure, on the contrary, the multipath routing protocol proposes redundancy on a prefailure scheme so that repair of a route is done by on-the fly replacement. Another way to improve the communication resiliency is the multi-homing mechanism managed by the transport level. It is a network access redundancy that establishes multiple network accesses for a same communication. The objective of the paper is to formally prove that the integration of multihoming and multipath improves the communication reliability. At the first, we precise the ad hoc network dependability framework, and analyze the way to integrate the two levels of redundancy, at the second we evaluate the gain in communication reliability.
冗余是在ad hoc网络的高动态环境中实现鲁棒性的关键概念。传统的响应式MANET路由协议在路由故障后进行修复,而多路径路由协议在故障前方案上提供冗余,通过动态替换来修复路由。另一种提高通信弹性的方法是由传输层管理的多归巢机制。它是一种网络访问冗余,为同一通信建立多个网络访问。本文的目的是正式证明多归与多径的结合提高了通信的可靠性。首先对自组网可靠性框架进行了精确设计,分析了两级冗余的集成方法,然后对通信可靠性的增益进行了评估。
{"title":"Transport and Routing Redundancy for MANETs Robustness","authors":"Amadou Baba Bagayoko, B. Paillassa, Cláudia Betous-Almeida","doi":"10.1109/ISPA.2009.12","DOIUrl":"https://doi.org/10.1109/ISPA.2009.12","url":null,"abstract":"Redundancy is the key notion to bring robustness in the highly dynamic environment of the ad hoc network. Traditionally, the reactive MANET routing protocol brings repair process after a route failure, on the contrary, the multipath routing protocol proposes redundancy on a prefailure scheme so that repair of a route is done by on-the fly replacement. Another way to improve the communication resiliency is the multi-homing mechanism managed by the transport level. It is a network access redundancy that establishes multiple network accesses for a same communication. The objective of the paper is to formally prove that the integration of multihoming and multipath improves the communication reliability. At the first, we precise the ad hoc network dependability framework, and analyze the way to integrate the two levels of redundancy, at the second we evaluate the gain in communication reliability.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133737240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
USGPA: A User-Centric and Secure Grid Portal Architecture for High-Performance Computing USGPA:面向高性能计算的以用户为中心的安全网格门户架构
Rongqiang Cao, Xue-bin Chi, Zongyan Cao, Zhihui Dai, Haili Xiao
a grid portal is one of the most important ways to access grid systems. The disadvantages existing in current grid portals are that they are designed for specific applications, difficult to add new applications. Besides, the security issues are not considered fully in these portals. In this paper, we proposed a user-centric and secure grid portal architecture-USGPA based on portlet. In USGPA, a security portlet model is proposed in which security issues for sensitive data and the portal server are solved. Based on the model, the application portlet model is proposed with which new applications can be encapsulated into portal quickly. Then all portlets for high-performance computing-HPC are designed based on these two models. With these portlets, users can not only manage jobs via portal but also can custom the portal by selecting and managing the applications they required. Last but important, a prototype is implemented to evaluate the scalability, security and efficiency of the architecture.
网格门户是访问网格系统的最重要的方法之一。当前网格门户存在的缺点是它们是为特定的应用程序设计的,难以添加新的应用程序。此外,这些门户没有充分考虑安全问题。本文提出了一种以用户为中心的安全网格门户体系结构——基于portlet的usgpa。在USGPA中,提出了一种安全portlet模型,解决了敏感数据和门户服务器的安全问题。在此基础上,提出了应用程序portlet模型,利用该模型可以快速地将新的应用程序封装到门户中。然后基于这两种模型设计了所有用于高性能计算的portlet。使用这些portlet,用户不仅可以通过门户管理作业,还可以通过选择和管理所需的应用程序来定制门户。最后,实现了一个原型来评估该体系结构的可扩展性、安全性和效率。
{"title":"USGPA: A User-Centric and Secure Grid Portal Architecture for High-Performance Computing","authors":"Rongqiang Cao, Xue-bin Chi, Zongyan Cao, Zhihui Dai, Haili Xiao","doi":"10.1109/ISPA.2009.90","DOIUrl":"https://doi.org/10.1109/ISPA.2009.90","url":null,"abstract":"a grid portal is one of the most important ways to access grid systems. The disadvantages existing in current grid portals are that they are designed for specific applications, difficult to add new applications. Besides, the security issues are not considered fully in these portals. In this paper, we proposed a user-centric and secure grid portal architecture-USGPA based on portlet. In USGPA, a security portlet model is proposed in which security issues for sensitive data and the portal server are solved. Based on the model, the application portlet model is proposed with which new applications can be encapsulated into portal quickly. Then all portlets for high-performance computing-HPC are designed based on these two models. With these portlets, users can not only manage jobs via portal but also can custom the portal by selecting and managing the applications they required. Last but important, a prototype is implemented to evaluate the scalability, security and efficiency of the architecture.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130120545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Time Exception Handling Algorithm of Temporal Workflow 一种时态工作流的时间异常处理算法
Ting Xie, Yang Yu, Guoshen Kuang
Based on an analysis of related work about time exception in workflow, an algorithm for time exception handling of temporal workflow is presented in the paper. The algorithm is to meet the overall deadline of the case via an approach of cutting down the slack time of remaining activities, when there is a time exception. Meanwhile, details about the adjusting strategy for various kinds of routing constructions are also discussed. Finally, contrast experiment is used to show the effectiveness of the algorithm.
在分析工作流中时间异常相关工作的基础上,提出了一种时序工作流的时间异常处理算法。该算法是在出现时间异常的情况下,通过减少剩余活动的空闲时间来满足案件的总体截止时间。同时,详细讨论了各种路线结构的调整策略。最后,通过对比实验验证了算法的有效性。
{"title":"A Time Exception Handling Algorithm of Temporal Workflow","authors":"Ting Xie, Yang Yu, Guoshen Kuang","doi":"10.1109/ISPA.2009.79","DOIUrl":"https://doi.org/10.1109/ISPA.2009.79","url":null,"abstract":"Based on an analysis of related work about time exception in workflow, an algorithm for time exception handling of temporal workflow is presented in the paper. The algorithm is to meet the overall deadline of the case via an approach of cutting down the slack time of remaining activities, when there is a time exception. Meanwhile, details about the adjusting strategy for various kinds of routing constructions are also discussed. Finally, contrast experiment is used to show the effectiveness of the algorithm.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134561111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utility Proportional Optimization Flow Control for Overlay Multicast 覆盖组播的效用比例优化流量控制
Ali Jafari, Hosein Shafiei, Baharan Mirzasoleiman, Ghodrat Sepidnam
A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in this paper, is concerned in electronic voting and some other similar application. At present, most non-interactive deniable authentication protocols cannot resist weaken key-compromise impersonation (W-KCI) attack. To settle this problem, a non-interactive identity-based restricted deniable authentication protocol is proposed. It not only can resist W-KCI attack but also has the properties of communication flexibility. It meets the security requirements such as correctness, restricted deniability as well. Therefore, this protocol can be applied in electronic voting.
可否认身份验证允许接收方识别接收到的消息的来源,但不能向任何第三方证明。然而,在电子投票和其他一些类似的应用中,内容的可否认性,在本文中被称为限制性可否认性。目前,大多数非交互式可否认身份验证协议都无法抵御弱密钥妥协冒充(W-KCI)攻击。为了解决这一问题,提出了一种非交互式的基于身份的受限可否认认证协议。它不仅能抵抗W-KCI攻击,而且具有通信灵活性。它还满足了正确性、受限可否认性等安全要求。因此,该协议可以应用于电子投票。
{"title":"Utility Proportional Optimization Flow Control for Overlay Multicast","authors":"Ali Jafari, Hosein Shafiei, Baharan Mirzasoleiman, Ghodrat Sepidnam","doi":"10.1109/ISPA.2009.108","DOIUrl":"https://doi.org/10.1109/ISPA.2009.108","url":null,"abstract":"A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in this paper, is concerned in electronic voting and some other similar application. At present, most non-interactive deniable authentication protocols cannot resist weaken key-compromise impersonation (W-KCI) attack. To settle this problem, a non-interactive identity-based restricted deniable authentication protocol is proposed. It not only can resist W-KCI attack but also has the properties of communication flexibility. It meets the security requirements such as correctness, restricted deniability as well. Therefore, this protocol can be applied in electronic voting.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134183544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ZDCF: An Improved DCF Solution of IEEE 802.11 ZDCF: IEEE 802.11改进的DCF解决方案
Jianli Zhang, Zhiyi Fang, Yunlong Zhang, Y. Ma
This paper first described the IEEE 802.11 MAC layer access control mechanism, that is, the DCF access control mechanism, analysis the basic DCF back-off algorithm BEB. Next, we study a variety of improved BEB algorithms, and then we proposed ZDCF back-off algorithm which is an exponential-based half back-off algorithm. ZDCF is flexible, easy to implement and has excellent performance as BEB algorithms when there is small scale of nodes, while at same time avoiding the shortcomings of BEB algorithm when there is large scale of nodes.
本文首先描述了IEEE 802.11 MAC层的访问控制机制,即DCF的访问控制机制,分析了DCF的基本回退算法BEB。其次,我们研究了各种改进的BEB算法,然后提出了ZDCF退退算法,这是一种基于指数的半退退算法。ZDCF灵活、易于实现,在节点规模较小时具有BEB算法的优良性能,同时避免了BEB算法在节点规模较大时的缺点。
{"title":"ZDCF: An Improved DCF Solution of IEEE 802.11","authors":"Jianli Zhang, Zhiyi Fang, Yunlong Zhang, Y. Ma","doi":"10.1109/ISPA.2009.82","DOIUrl":"https://doi.org/10.1109/ISPA.2009.82","url":null,"abstract":"This paper first described the IEEE 802.11 MAC layer access control mechanism, that is, the DCF access control mechanism, analysis the basic DCF back-off algorithm BEB. Next, we study a variety of improved BEB algorithms, and then we proposed ZDCF back-off algorithm which is an exponential-based half back-off algorithm. ZDCF is flexible, easy to implement and has excellent performance as BEB algorithms when there is small scale of nodes, while at same time avoiding the shortcomings of BEB algorithm when there is large scale of nodes.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133449736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Trustable Virtual Organisation 迈向可信赖的虚拟组织
J. Huh, Andrew P. Martin
In many scientific disciplines, the models, data and methods used to produce results have significant commercial value. Researchers in these sectors are often unwilling to exploit the full potential of grid computing because there remains a `trust gap' between their security requirements and present solutions. We describe two trustable architectures, one applicable for a computational grid and the other for a data grid. Both allow the participants to verify the security configurations of others as well as report their own through a remote configuration management service. The grid jobs are dispatched to only those trustworthy, and guaranteed to run in protected execution environments. Furthermore, our trustworthy analysis server enables statistical analyses to be performed on sensitive raw data --- collected from multiple domains --- without disclosing it to anyone.
在许多科学学科中,用于产生结果的模型、数据和方法具有重大的商业价值。这些领域的研究人员通常不愿意开发网格计算的全部潜力,因为在他们的安全需求和目前的解决方案之间仍然存在“信任鸿沟”。我们描述了两种可信赖的体系结构,一种适用于计算网格,另一种适用于数据网格。两者都允许参与者验证其他人的安全配置,并通过远程配置管理服务报告自己的安全配置。网格作业只分配给那些值得信任的人,并保证在受保护的执行环境中运行。此外,我们值得信赖的分析服务器可以对敏感的原始数据进行统计分析-从多个领域收集-而不会向任何人披露。
{"title":"Towards a Trustable Virtual Organisation","authors":"J. Huh, Andrew P. Martin","doi":"10.1109/ISPA.2009.72","DOIUrl":"https://doi.org/10.1109/ISPA.2009.72","url":null,"abstract":"In many scientific disciplines, the models, data and methods used to produce results have significant commercial value. Researchers in these sectors are often unwilling to exploit the full potential of grid computing because there remains a `trust gap' between their security requirements and present solutions. We describe two trustable architectures, one applicable for a computational grid and the other for a data grid. Both allow the participants to verify the security configurations of others as well as report their own through a remote configuration management service. The grid jobs are dispatched to only those trustworthy, and guaranteed to run in protected execution environments. Furthermore, our trustworthy analysis server enables statistical analyses to be performed on sensitive raw data --- collected from multiple domains --- without disclosing it to anyone.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of a RFID Based Real-Time Location-Aware System in Clean Room 基于RFID的无尘室实时位置感知系统的设计与实现
Kun-Ming Yu, Ming-Gong Lee, Chien-Tung Liao, Hung-Jui Lin
Application of Automated Material Handling System (AMHS) to the semiconductor manufacturing factories is one of the most important steps in the automation process of semiconductor business. All cassettes in the vehicle of the transportation facility can send their positioning information through this system. Nevertheless, some positioning information may still be interfered or get lost if there is any relocation of the cassette inside the effective ranges of AMHS by operators. In order to retrieve these lost cassettes only manpower is possible, and the relocation process is time wasting and inefficient. In this paper, we have implemented a Clean Room Real-Time Location-aware System (CRRLS) that is based on the technology of RFID (Radio Frequency Identification). The proposed system can reveal the positioning information of the cassette in the clean room by analyzing the received radio frequency energy information. Moreover, we establish a transmitting model of radio signal, and used this model to estimate distance between RFID tag and readers. A triangular positioning algorithm is developed to estimate the location and its 2-dimensional coordinate of the cassette. Furthermore, reusable RFID tags can save additional information sent by the transceivers and data of parameters for the production process to reduce the possibility of severe damage because of wrong parameters setting. As a result, competitive advantage of the semiconductor business can herewith greatly increase.
自动化物料搬运系统(AMHS)在半导体制造工厂的应用是半导体业务自动化过程中最重要的一步。运输设施车辆中的所有卡带都可以通过该系统发送其定位信息。然而,如果作业者将卡带移至AMHS有效范围内,仍有可能干扰或丢失部分定位信息。为了找回这些丢失的磁带,只有人力是可能的,而重新安置的过程既浪费时间又效率低下。在本文中,我们实现了一个基于射频识别技术的无尘室实时位置感知系统(CRRLS)。该系统通过对接收到的射频能量信息进行分析,揭示出洁净室中卡带的定位信息。此外,我们还建立了射频信号的传输模型,并利用该模型来估计RFID标签与读写器之间的距离。提出了一种三角定位算法来估计箱体的位置及其二维坐标。此外,可重复使用的RFID标签可以保存收发器发送的额外信息和生产过程中的参数数据,减少因参数设置错误而造成严重损坏的可能性。因此,半导体企业的竞争优势可以大大增加。
{"title":"Design and Implementation of a RFID Based Real-Time Location-Aware System in Clean Room","authors":"Kun-Ming Yu, Ming-Gong Lee, Chien-Tung Liao, Hung-Jui Lin","doi":"10.1109/ISPA.2009.84","DOIUrl":"https://doi.org/10.1109/ISPA.2009.84","url":null,"abstract":"Application of Automated Material Handling System (AMHS) to the semiconductor manufacturing factories is one of the most important steps in the automation process of semiconductor business. All cassettes in the vehicle of the transportation facility can send their positioning information through this system. Nevertheless, some positioning information may still be interfered or get lost if there is any relocation of the cassette inside the effective ranges of AMHS by operators. In order to retrieve these lost cassettes only manpower is possible, and the relocation process is time wasting and inefficient. In this paper, we have implemented a Clean Room Real-Time Location-aware System (CRRLS) that is based on the technology of RFID (Radio Frequency Identification). The proposed system can reveal the positioning information of the cassette in the clean room by analyzing the received radio frequency energy information. Moreover, we establish a transmitting model of radio signal, and used this model to estimate distance between RFID tag and readers. A triangular positioning algorithm is developed to estimate the location and its 2-dimensional coordinate of the cassette. Furthermore, reusable RFID tags can save additional information sent by the transceivers and data of parameters for the production process to reduce the possibility of severe damage because of wrong parameters setting. As a result, competitive advantage of the semiconductor business can herewith greatly increase.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125478348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Business-Oriented Fault Localization Approach Using Digraph 面向业务的有向图故障定位方法
Lianzhong Liu, Chunfang Li, Yanping Zhang
Analyzed here is a fault localization approach based on directed graph in view point of business software. The fault propagation model solved the problem of obtaining the dependency relationship of faults and symptoms semi-automatically. The main idea includes: get the deployment graph of managed business from the topography of network and software environment; generate the adjacency matrix of the graph; compute the transitive closure of adjacency matrix and obtain a so-called dependency matrix; independent fault locates in the main diagonals of the dependency matrix, elements of column is fault’s symptoms domain, which are divided into immediate effect and transitive effect. In real world, those elements will denote symptoms, but the two class affected nodes have different probability of occurrence, that is, immediate symptoms can be observed more likely than transitive symptoms and symptom of fault itself is most likely observed. Based on the hypothesis, a new fault localization algorithm is proposed. The simulation results show the validity and efficiency of this fault localization approach.
从商业软件的角度出发,分析了一种基于有向图的故障定位方法。故障传播模型解决了故障与症状依赖关系的半自动获取问题。其主要思想包括:从网络和软件环境的地形图中得到被管理业务的部署图;生成图的邻接矩阵;计算邻接矩阵的传递闭包,得到所谓的依赖矩阵;独立故障位于依赖矩阵的主对角线上,列的元素为故障的症状域,分为直接效应和传递效应。在现实世界中,这些元素将表示症状,但两类受影响节点的发生概率不同,即观察到立即症状的可能性大于观察到传递症状的可能性,而观察到故障本身症状的可能性最大。基于这一假设,提出了一种新的故障定位算法。仿真结果表明了该方法的有效性和有效性。
{"title":"A Business-Oriented Fault Localization Approach Using Digraph","authors":"Lianzhong Liu, Chunfang Li, Yanping Zhang","doi":"10.1109/ISPA.2009.17","DOIUrl":"https://doi.org/10.1109/ISPA.2009.17","url":null,"abstract":"Analyzed here is a fault localization approach based on directed graph in view point of business software. The fault propagation model solved the problem of obtaining the dependency relationship of faults and symptoms semi-automatically. The main idea includes: get the deployment graph of managed business from the topography of network and software environment; generate the adjacency matrix of the graph; compute the transitive closure of adjacency matrix and obtain a so-called dependency matrix; independent fault locates in the main diagonals of the dependency matrix, elements of column is fault’s symptoms domain, which are divided into immediate effect and transitive effect. In real world, those elements will denote symptoms, but the two class affected nodes have different probability of occurrence, that is, immediate symptoms can be observed more likely than transitive symptoms and symptom of fault itself is most likely observed. Based on the hypothesis, a new fault localization algorithm is proposed. The simulation results show the validity and efficiency of this fault localization approach.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generation of Web Knowledge Flow for Personalized Services 面向个性化服务的Web知识流生成
Jie Yu, Xiangfeng Luo, Fei-yue Ye, Yong-mei Lei
Personalized services provide specific services to satisfy user’s real-time requirements. How to effectively discover and organize proper Web resources is a key issue. Based on Web Knowledge Flow which is used to semantically organize and represent Web resources that are recommended to user, this paper presents a 3-way strategy of finding proper resources for a user in multi-user environment. With this strategy, generation of Web Knowledge Flow can be accomplished based on collaborative user and Semantics Link Network. First, according to the similarity degree between active user and collaborative user, collaborative user is refined to strict kind and loose kind. Secondly, user’s browsing sequence of Web resources is presented to find collaborative users and implemented in a 3-D coordinate space. Thirdly, average information entropy of semantic relationship between Web resources is presented to evaluate the similarity of users’ browsing feature. The experimental results demonstrate the validity of the method. It can be seen that the proposed method has a brilliant perspective in the applications of Web personalized services.
个性化服务提供特定的服务,以满足用户的实时需求。如何有效地发现和组织适当的Web资源是一个关键问题。基于Web知识流(Web Knowledge Flow)对用户推荐的Web资源进行语义组织和表示,提出了一种在多用户环境中为用户寻找合适资源的三向策略。利用该策略,可以实现基于协同用户和语义链接网络的Web知识流生成。首先,根据活跃用户和协同用户的相似度,将协同用户细化为严格类和松散类;其次,提出用户浏览Web资源的顺序,寻找协同用户,并在三维坐标空间中实现;再次,提出了Web资源间语义关系的平均信息熵来评价用户浏览特征的相似度;实验结果证明了该方法的有效性。由此可见,本文提出的方法在Web个性化服务的应用中具有广阔的应用前景。
{"title":"Generation of Web Knowledge Flow for Personalized Services","authors":"Jie Yu, Xiangfeng Luo, Fei-yue Ye, Yong-mei Lei","doi":"10.1109/ISPA.2009.41","DOIUrl":"https://doi.org/10.1109/ISPA.2009.41","url":null,"abstract":"Personalized services provide specific services to satisfy user’s real-time requirements. How to effectively discover and organize proper Web resources is a key issue. Based on Web Knowledge Flow which is used to semantically organize and represent Web resources that are recommended to user, this paper presents a 3-way strategy of finding proper resources for a user in multi-user environment. With this strategy, generation of Web Knowledge Flow can be accomplished based on collaborative user and Semantics Link Network. First, according to the similarity degree between active user and collaborative user, collaborative user is refined to strict kind and loose kind. Secondly, user’s browsing sequence of Web resources is presented to find collaborative users and implemented in a 3-D coordinate space. Thirdly, average information entropy of semantic relationship between Web resources is presented to evaluate the similarity of users’ browsing feature. The experimental results demonstrate the validity of the method. It can be seen that the proposed method has a brilliant perspective in the applications of Web personalized services.","PeriodicalId":346815,"journal":{"name":"2009 IEEE International Symposium on Parallel and Distributed Processing with Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122779061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 IEEE International Symposium on Parallel and Distributed Processing with Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1