首页 > 最新文献

2010 IEEE 16th International Conference on Parallel and Distributed Systems最新文献

英文 中文
PicFS: The Privacy-Enhancing Image-Based Collaborative File System PicFS:增强隐私的基于图像的协作文件系统
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.13
Chris Sosa, Blake C. Sutton, H. H. Huang
Cloud computing makes available a vast amount of computation and storage resources in the pay-as-you-go manner. However, the users of cloud storage have to trust the providers to ensure the data privacy and confidentiality. In this paper, we present the Privacy-enhancing Image-based Collaborative File System (PicFS), a network file system that steganographically encodes itself into images and provides anonymous uploads and downloads from a media sharing website. PicFS provides plausible deniability by preventing traffic and image analysis by any third party from revealing the existence of PicFS or compromising its data. Because all accesses are anonymized, users of PicFS are dissociated from their data, which protects users against being compelled to release their keys. For further security and ease of use, we develop a method for automatically generating a large set of non-suspicious images to serve as input to the system. Our prototype leverages a number of existing technologies, including the F5 algorithm for steganography, Quick-Flickr for Flickr API access, Tor for anonymization, and FUSE-J for user-level file system calls. We show that the PicFS is indeed practical as the prototype demonstrates satisfactory performance in the real-world environment.
云计算以现收现付的方式提供了大量的计算和存储资源。然而,云存储的用户必须信任提供商,以确保数据的隐私性和保密性。在本文中,我们提出了一种增强隐私的基于图像的协作文件系统(PicFS),这是一种网络文件系统,它将自己隐写编码为图像,并提供来自媒体共享网站的匿名上传和下载。PicFS通过防止任何第三方的流量和图像分析来揭示PicFS的存在或损害其数据,从而提供了合理的推诿。因为所有的访问都是匿名的,所以PicFS的用户与他们的数据是分离的,这保护了用户不被强迫释放他们的密钥。为了进一步提高安全性和易用性,我们开发了一种自动生成大量非可疑图像作为系统输入的方法。我们的原型利用了许多现有的技术,包括用于隐写的F5算法、用于访问Flickr API的Quick-Flickr、用于匿名化的Tor和用于用户级文件系统调用的FUSE-J。我们证明了PicFS确实是实用的,因为原型在现实环境中表现出令人满意的性能。
{"title":"PicFS: The Privacy-Enhancing Image-Based Collaborative File System","authors":"Chris Sosa, Blake C. Sutton, H. H. Huang","doi":"10.1109/ICPADS.2010.13","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.13","url":null,"abstract":"Cloud computing makes available a vast amount of computation and storage resources in the pay-as-you-go manner. However, the users of cloud storage have to trust the providers to ensure the data privacy and confidentiality. In this paper, we present the Privacy-enhancing Image-based Collaborative File System (PicFS), a network file system that steganographically encodes itself into images and provides anonymous uploads and downloads from a media sharing website. PicFS provides plausible deniability by preventing traffic and image analysis by any third party from revealing the existence of PicFS or compromising its data. Because all accesses are anonymized, users of PicFS are dissociated from their data, which protects users against being compelled to release their keys. For further security and ease of use, we develop a method for automatically generating a large set of non-suspicious images to serve as input to the system. Our prototype leverages a number of existing technologies, including the F5 algorithm for steganography, Quick-Flickr for Flickr API access, Tor for anonymization, and FUSE-J for user-level file system calls. We show that the PicFS is indeed practical as the prototype demonstrates satisfactory performance in the real-world environment.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"26 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120992010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Building Similar Link Network in Large-Scale Web Resources 在大型Web资源中构建相似链接网络
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.120
Xiangfeng Luo, Jingjing Ni, Jun Zhang, Lizhe Wang
Similar Link Network (SiLN) is a semantic over layer on Web resources with similar relations instead of hyperlinks, which aims at providing plentiful semantics for intelligent Web activities. However, SiLN is difficult to be built based on cosine computation in large-scale Web resources due to its high building time complexity and weak connectivity. Herein, three strategies are proposed to address those issues. First, dividing and conquering strategy is applied to divide the large-scale Web resources into amounts of rough similar communities, which reduces SiLN’s building time complexity significantly. After that, a multi-level structure network is designed to effectively manage the large-scale Web resources to guarantee SiLN’s connectivity. Finally, two-level feedback with isolated resources strategy is developed to improve the accuracy of the building of SiLN. Experimental results have proved that our proposed method of building SiLN is feasible and efficient, with the merits of low complexity, good connectivity and high precision.
相似链接网络(SiLN)是一种建立在具有相似关系的Web资源之上的语义层,旨在为智能Web活动提供丰富的语义。然而,在大规模Web资源中,由于构建时间复杂度高,连通性弱,难以基于余弦计算构建SiLN。本文提出了三个策略来解决这些问题。首先,采用分而征服的策略,将大规模Web资源划分为大量的粗略相似社区,显著降低了SiLN的构建时间复杂度。然后设计多级结构的网络,有效管理大规模的Web资源,保证SiLN的连通性。最后,提出了基于孤立资源的两级反馈策略,提高了网络构建的准确性。实验结果证明了该方法的可行性和有效性,具有复杂度低、连通性好、精度高等优点。
{"title":"Building Similar Link Network in Large-Scale Web Resources","authors":"Xiangfeng Luo, Jingjing Ni, Jun Zhang, Lizhe Wang","doi":"10.1109/ICPADS.2010.120","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.120","url":null,"abstract":"Similar Link Network (SiLN) is a semantic over layer on Web resources with similar relations instead of hyperlinks, which aims at providing plentiful semantics for intelligent Web activities. However, SiLN is difficult to be built based on cosine computation in large-scale Web resources due to its high building time complexity and weak connectivity. Herein, three strategies are proposed to address those issues. First, dividing and conquering strategy is applied to divide the large-scale Web resources into amounts of rough similar communities, which reduces SiLN’s building time complexity significantly. After that, a multi-level structure network is designed to effectively manage the large-scale Web resources to guarantee SiLN’s connectivity. Finally, two-level feedback with isolated resources strategy is developed to improve the accuracy of the building of SiLN. Experimental results have proved that our proposed method of building SiLN is feasible and efficient, with the merits of low complexity, good connectivity and high precision.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123795383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing MapReduce via Asynchronous Data Processing 通过异步数据处理增强MapReduce
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.116
M. Elteir, Heshan Lin, Wu-chun Feng
The Map Reduce programming model simplifies large-scale data processing on commodity clusters by having users specify a map function that processes input key/value pairs to generate intermediate key/value pairs, and a reduce function that merges and converts intermediate key/value pairs into final results. Typical Map Reduce implementations such as Hadoop enforce barrier synchronization between the map and reduce phases, i.e., the reduce phase does not start until all map tasks are finished. In turn, this synchronization requirement can cause inefficient utilization of computing resources and can adversely impact performance. Thus, we present and evaluate two different approaches to cope with the synchronization drawback of existing Map Reduce implementations. The first approach, hierarchical reduction, starts a reduce task as soon as a predefined number of map tasks completes, it then aggregates the results of different reduce tasks following a tree structure. The second approach, incremental reduction, starts a predefined number of reduce tasks from the beginning and has each reduce task incrementally reduce records collected from map tasks. Together with our performance modeling, we evaluate different reducing approaches with two real applications on a 32-node cluster. The experimental results have shown that incremental reduction outperforms hierarchical reduction in general. Also, incremental reduction can speed-up the original Hadoop implementation by up to 35.33% for the word count application and 57.98% for the grep application. In addition, incremental reduction outperforms the original Hadoop in an emulated cloud environment with heterogeneous compute nodes.
Map Reduce编程模型简化了商品集群上的大规模数据处理,它让用户指定一个Map函数来处理输入的键/值对以生成中间键/值对,以及一个Reduce函数来合并中间键/值对并将其转换为最终结果。典型的Map Reduce实现,如Hadoop,在Map和Reduce阶段之间强制barrier同步,也就是说,Reduce阶段直到所有Map任务完成后才开始。反过来,这种同步需求可能导致计算资源的低效利用,并可能对性能产生不利影响。因此,我们提出并评估了两种不同的方法来解决现有Map Reduce实现的同步缺点。第一种方法是分层约简,它在预定义数量的映射任务完成后立即启动一个约简任务,然后按照树结构聚合不同的约简任务的结果。第二种方法是增量减少,从一开始就启动预定义数量的减少任务,并让每个减少任务增量地减少从映射任务收集的记录。结合我们的性能建模,我们用一个32节点集群上的两个实际应用程序评估了不同的简化方法。实验结果表明,增量约简总体上优于分层约简。此外,对于单词计数应用程序,增量减少可以将原始Hadoop实现的速度提高35.33%,对于grep应用程序,可以提高57.98%。此外,在具有异构计算节点的模拟云环境中,增量缩减性能优于原始Hadoop。
{"title":"Enhancing MapReduce via Asynchronous Data Processing","authors":"M. Elteir, Heshan Lin, Wu-chun Feng","doi":"10.1109/ICPADS.2010.116","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.116","url":null,"abstract":"The Map Reduce programming model simplifies large-scale data processing on commodity clusters by having users specify a map function that processes input key/value pairs to generate intermediate key/value pairs, and a reduce function that merges and converts intermediate key/value pairs into final results. Typical Map Reduce implementations such as Hadoop enforce barrier synchronization between the map and reduce phases, i.e., the reduce phase does not start until all map tasks are finished. In turn, this synchronization requirement can cause inefficient utilization of computing resources and can adversely impact performance. Thus, we present and evaluate two different approaches to cope with the synchronization drawback of existing Map Reduce implementations. The first approach, hierarchical reduction, starts a reduce task as soon as a predefined number of map tasks completes, it then aggregates the results of different reduce tasks following a tree structure. The second approach, incremental reduction, starts a predefined number of reduce tasks from the beginning and has each reduce task incrementally reduce records collected from map tasks. Together with our performance modeling, we evaluate different reducing approaches with two real applications on a 32-node cluster. The experimental results have shown that incremental reduction outperforms hierarchical reduction in general. Also, incremental reduction can speed-up the original Hadoop implementation by up to 35.33% for the word count application and 57.98% for the grep application. In addition, incremental reduction outperforms the original Hadoop in an emulated cloud environment with heterogeneous compute nodes.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116246496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Detection of a Weak Conjunction of Unstable Predicates in Dynamic Systems 动态系统中不稳定谓词弱合的检测
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.80
Xinli Wang, Jean Mayo, G. Hembroff
A weak conjunctive predicate is a conjunction of local predicates that is evaluated under the Possibly modality. In this study, we have proposed a distributed on-line algorithm for detecting weak conjunctions of unstable predicates in dynamic systems. In the algorithm, a virtual network of a logical ring combined with computation trees is dynamically maintained using local variables to keep track of causality relationships between distributed events. The differential technique is exploited to minimize the size of detection related information. During the execution of the distributed computation, each process maintains a vector containing potential solutions. Detection will be announced when the global predicate is verified. This algorithm does not require extra messages except those for process termination. The detection of a solution may not be announced until the termination of the underlying distributed computation in the case where a process never communicates with others. At each process, storage need is proportional to the number of processes in the system. This demand will increase in some extreme cases, although they are very rare in practice.
弱连接谓词是在可能情态下评估的局部谓词的连接。在这项研究中,我们提出了一种分布式在线算法来检测动态系统中不稳定谓词的弱连接。该算法利用局部变量动态维护由逻辑环和计算树组成的虚拟网络,跟踪分布式事件之间的因果关系。差分技术被用来最小化检测相关信息的大小。在执行分布式计算期间,每个进程维护一个包含潜在解决方案的向量。当验证全局谓词时,将宣布检测结果。除了进程终止的消息外,该算法不需要额外的消息。在进程从不与其他进程通信的情况下,直到底层分布式计算结束时才可能宣布检测到解决方案。在每个进程中,存储需求与系统中的进程数量成正比。这种需求在某些极端情况下会增加,尽管在实践中非常罕见。
{"title":"Detection of a Weak Conjunction of Unstable Predicates in Dynamic Systems","authors":"Xinli Wang, Jean Mayo, G. Hembroff","doi":"10.1109/ICPADS.2010.80","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.80","url":null,"abstract":"A weak conjunctive predicate is a conjunction of local predicates that is evaluated under the Possibly modality. In this study, we have proposed a distributed on-line algorithm for detecting weak conjunctions of unstable predicates in dynamic systems. In the algorithm, a virtual network of a logical ring combined with computation trees is dynamically maintained using local variables to keep track of causality relationships between distributed events. The differential technique is exploited to minimize the size of detection related information. During the execution of the distributed computation, each process maintains a vector containing potential solutions. Detection will be announced when the global predicate is verified. This algorithm does not require extra messages except those for process termination. The detection of a solution may not be announced until the termination of the underlying distributed computation in the case where a process never communicates with others. At each process, storage need is proportional to the number of processes in the system. This demand will increase in some extreme cases, although they are very rare in practice.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a P2P Cloud: Reliable Resource Reservations in Unreliable P2P Systems 走向P2P云:不可靠P2P系统中的可靠资源预留
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.34
Kalman Graffi, D. Stingl, C. Gross, Hoang Nguyen, A. Kovacevic, R. Steinmetz
The peer-to-peer paradigm shows the potential to provide the same functionality and quality like client/server based systems, but with much lower costs. However, the resources, e.g. storage space, CPU power and online time, provided by the peers are unreliable due to churn. In order to enable churn resistant reliable services using the resources in p2p systems, we propose in this paper a distributed mechanism termed P3R3O.KOM. The mechanism allows to reserve, monitor and use resources provided by the unreliable p2p system and maintains long-term resource reservations through controlled redundant resource provision. Evaluation shows that using KAD measurements on the prediction of the lifetime of peers allows for 100% successful reservations under churn with very low traffic overhead. This approach marks a first step for the building of a reliable p2p-based SOA and future p2p-based clouds.
点对点范式显示了提供与基于客户机/服务器的系统相同的功能和质量的潜力,但成本要低得多。然而,由对等体提供的资源,如存储空间、CPU能力和在线时间,由于用户流失是不可靠的。为了利用p2p系统中的资源提供抗流失的可靠服务,本文提出了一种名为p3r30 . kom的分布式机制。该机制允许预留、监控和使用不可靠的p2p系统提供的资源,并通过可控的冗余资源提供来维持长期的资源预留。评估表明,在预测对等体的生命周期时使用KAD度量可以在流量开销非常低的情况下实现100%的成功预订。这种方法标志着构建可靠的基于p2p的SOA和未来基于p2p的云的第一步。
{"title":"Towards a P2P Cloud: Reliable Resource Reservations in Unreliable P2P Systems","authors":"Kalman Graffi, D. Stingl, C. Gross, Hoang Nguyen, A. Kovacevic, R. Steinmetz","doi":"10.1109/ICPADS.2010.34","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.34","url":null,"abstract":"The peer-to-peer paradigm shows the potential to provide the same functionality and quality like client/server based systems, but with much lower costs. However, the resources, e.g. storage space, CPU power and online time, provided by the peers are unreliable due to churn. In order to enable churn resistant reliable services using the resources in p2p systems, we propose in this paper a distributed mechanism termed P3R3O.KOM. The mechanism allows to reserve, monitor and use resources provided by the unreliable p2p system and maintains long-term resource reservations through controlled redundant resource provision. Evaluation shows that using KAD measurements on the prediction of the lifetime of peers allows for 100% successful reservations under churn with very low traffic overhead. This approach marks a first step for the building of a reliable p2p-based SOA and future p2p-based clouds.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Performance Data Extrapolation in Parallel Codes 并行代码中的性能数据外推
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.79
Juan Gonzalez, Judit Giménez, Jesús Labarta
Measuring the performance of parallel codes is a compromise between lots of factors. The most important one is which data has to be analyzed. Current supercomputers are able to run applications in large number of processors as well as the analysis data that can be extracted is also large and varied. That implies a hard compromise between the potential problems one want to analyze and the information one is able to capture during the application execution. In this paper we present an extrapolation methodology to maximize the information extracted in a single application execution. It is based on a structural characterization of the applications, performed using clustering techniques, the ability to multiplex the read of performance hardware counters, plus a projection process. As a result, we obtain the approximated values of a large set of metrics for each phase of the application, with minimum error.
测量并行代码的性能是许多因素之间的折衷。最重要的是要分析哪些数据。目前的超级计算机能够在大量的处理器上运行应用程序,并且可以提取的分析数据也很大而且变化很大。这意味着在想要分析的潜在问题和在应用程序执行期间能够捕获的信息之间要做出艰难的妥协。在本文中,我们提出了一种外推方法来最大化在单个应用程序执行中提取的信息。它基于应用程序的结构特征,使用聚类技术、对性能硬件计数器的读取进行多路复用的能力,以及投影过程。因此,我们以最小的误差为应用程序的每个阶段获得了大量度量的近似值。
{"title":"Performance Data Extrapolation in Parallel Codes","authors":"Juan Gonzalez, Judit Giménez, Jesús Labarta","doi":"10.1109/ICPADS.2010.79","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.79","url":null,"abstract":"Measuring the performance of parallel codes is a compromise between lots of factors. The most important one is which data has to be analyzed. Current supercomputers are able to run applications in large number of processors as well as the analysis data that can be extracted is also large and varied. That implies a hard compromise between the potential problems one want to analyze and the information one is able to capture during the application execution. In this paper we present an extrapolation methodology to maximize the information extracted in a single application execution. It is based on a structural characterization of the applications, performed using clustering techniques, the ability to multiplex the read of performance hardware counters, plus a projection process. As a result, we obtain the approximated values of a large set of metrics for each phase of the application, with minimum error.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cost-Effective Congestion Management for Interconnection Networks Using Distributed Deterministic Routing 采用分布式确定路由的互连网络的成本效益拥塞管理
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.14
J. Escudero-Sahuquillo, P. García, F. Quiles, J. Flich, J. Duato
The Interconnection networks are essential elements in current computing systems. For this reason, achieving the best network performance, even in congestion situations, has been a primary goal in recent years. In that sense, there exist several techniques focused on eliminating the main negative effect of congestion: the Head of Line (HOL) blocking. One of the most successful HOL blocking elimination techniques is RECN, which can be applied in source routing networks. FBICM follows the same approach as RECN, but it has been developed for distributed deterministic routing networks. Although FBICM effectively eliminates HOL blocking, it requires too much resources to be implemented. In this paper we present a new FBICM version, based on a new organization of switch memory resources, that significantly reduces the required silicon area, complexity and cost. Moreover, we present new results about FBICM, in network topologies not yet analyzed. From the experiment results we can conclude that a far less complex and feasible FBICM implementation can be achieved by using the proposed improvements, while not losing efficiency.
互连网络是当前计算系统的重要组成部分。因此,即使在拥塞情况下,实现最佳网络性能一直是近年来的主要目标。从这个意义上说,有几种技术专注于消除拥塞的主要负面影响:线路头部(HOL)阻塞。RECN是最成功的HOL阻塞消除技术之一,它可以应用于源路由网络。FBICM遵循与RECN相同的方法,但它是为分布式确定性路由网络开发的。虽然FBICM有效地消除了HOL阻塞,但它需要太多的资源来实现。在本文中,我们提出了一个新的FBICM版本,基于一种新的开关存储器资源组织,大大减少了所需的硅面积,复杂性和成本。此外,我们在尚未分析的网络拓扑中提出了关于FBICM的新结果。从实验结果中我们可以得出结论,使用所提出的改进可以在不损失效率的情况下实现远不那么复杂和可行的FBICM。
{"title":"Cost-Effective Congestion Management for Interconnection Networks Using Distributed Deterministic Routing","authors":"J. Escudero-Sahuquillo, P. García, F. Quiles, J. Flich, J. Duato","doi":"10.1109/ICPADS.2010.14","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.14","url":null,"abstract":"The Interconnection networks are essential elements in current computing systems. For this reason, achieving the best network performance, even in congestion situations, has been a primary goal in recent years. In that sense, there exist several techniques focused on eliminating the main negative effect of congestion: the Head of Line (HOL) blocking. One of the most successful HOL blocking elimination techniques is RECN, which can be applied in source routing networks. FBICM follows the same approach as RECN, but it has been developed for distributed deterministic routing networks. Although FBICM effectively eliminates HOL blocking, it requires too much resources to be implemented. In this paper we present a new FBICM version, based on a new organization of switch memory resources, that significantly reduces the required silicon area, complexity and cost. Moreover, we present new results about FBICM, in network topologies not yet analyzed. From the experiment results we can conclude that a far less complex and feasible FBICM implementation can be achieved by using the proposed improvements, while not losing efficiency.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128165136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cross-Layer Design to Merge Structured P2P Networks over MANET 在MANET上合并结构化P2P网络的跨层设计
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.93
Nadir Shah, D. Qian
Peer-to-peer (P2P) network is an alternative of client/server system for sharing resources, e.g. files. P2P network is a robust, distributed and fault tolerant architecture. There are basic two types of P2P networks, structured P2P network and unstructured P2P network. Each of them has its own applications and advantages. Due recent advances in wireless and mobile technology, the P2P network can be deployed over mobile ad hoc network (MANET). We consider the scenarios of P2P network over MANET where all nodes are not the members of P2P network. Due to limited radio range and the mobility of nodes in MANET, there can occur network partition and merging of networks in the physical network. This can also lead to P2P network partition and merging at overlay layer. When two physical networks merge by coming into communication range of each other then their P2P networks would not be connected at overlay layer. Because P2P network operates at application layer as an overlay network. That is their P2P networks are connected in physical network but these P2P networks are disconnected at overlay layer. To detect this situation and merge these P2P networks at overlay layer, we extend the ODACP, an address auto-configuration protocol. Then we propose an approach to efficiently merge P2P networks such that routing traffic is minimized. Considering limited radio range and mobility of nodes, the simulation results shows that CAN over MANET performs better as compared to Chord over MANET in term of routing traffic and false-negative ratio.
点对点(P2P)网络是客户端/服务器系统的另一种选择,用于共享资源,例如文件。P2P网络是一种鲁棒、分布式、容错的网络体系结构。P2P网络有两种基本类型:结构化的P2P网络和非结构化的P2P网络。每一种都有自己的应用和优势。由于无线和移动技术的最新进展,P2P网络可以部署在移动自组织网络(MANET)上。我们考虑了基于MANET的P2P网络的场景,其中所有节点都不是P2P网络的成员。由于MANET中无线范围的限制和节点的移动性,在物理网络中会出现网络划分和网络合并的问题。这也会导致P2P网络在覆盖层的划分和合并。当两个物理网络通过进入彼此的通信范围而合并时,它们的P2P网络将不会在覆盖层连接。因为P2P网络在应用层作为覆盖网络运行。即它们的P2P网络在物理网络中是连接的,但这些P2P网络在覆盖层是断开的。为了检测这种情况并在覆盖层合并这些P2P网络,我们扩展了地址自动配置协议ODACP。然后,我们提出了一种有效合并P2P网络的方法,使路由流量最小化。考虑到有限的无线电范围和节点的可移动性,仿真结果表明CAN over MANET在路由流量和误报率方面优于Chord over MANET。
{"title":"Cross-Layer Design to Merge Structured P2P Networks over MANET","authors":"Nadir Shah, D. Qian","doi":"10.1109/ICPADS.2010.93","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.93","url":null,"abstract":"Peer-to-peer (P2P) network is an alternative of client/server system for sharing resources, e.g. files. P2P network is a robust, distributed and fault tolerant architecture. There are basic two types of P2P networks, structured P2P network and unstructured P2P network. Each of them has its own applications and advantages. Due recent advances in wireless and mobile technology, the P2P network can be deployed over mobile ad hoc network (MANET). We consider the scenarios of P2P network over MANET where all nodes are not the members of P2P network. Due to limited radio range and the mobility of nodes in MANET, there can occur network partition and merging of networks in the physical network. This can also lead to P2P network partition and merging at overlay layer. When two physical networks merge by coming into communication range of each other then their P2P networks would not be connected at overlay layer. Because P2P network operates at application layer as an overlay network. That is their P2P networks are connected in physical network but these P2P networks are disconnected at overlay layer. To detect this situation and merge these P2P networks at overlay layer, we extend the ODACP, an address auto-configuration protocol. Then we propose an approach to efficiently merge P2P networks such that routing traffic is minimized. Considering limited radio range and mobility of nodes, the simulation results shows that CAN over MANET performs better as compared to Chord over MANET in term of routing traffic and false-negative ratio.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131348191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Utility Accrual Object Distribution in Real-Time Systems 实时系统中的效用应计对象分布
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.99
M. Mohaqeqi, M. Kargahi
This paper considers object-based distributed real-time systems within which objects provide system services to the real-time tasks. Each task is subject to a time/utility function (TUF) which determines the accrued utility of the task according to its completion time. One major problem in such systems is to place the objects onto the computing nodes so as to maximize the total accrued utility. Thus, we propose a utility accrual object distribution (UAOD) algorithm which consists of two phases. In the first phase, through object placement and replication beside some types of deadline decomposition and adaptation, the computing nodes are reserved for the most beneficial tasks. As the second phase, UAOD follows a load-balancing algorithm for the placement of the remaining objects on the nodes to service the less beneficial tasks. Simulation results reveal that the total accrued utility is improved with the UAOD algorithm comparing to the traditional object placement methods.
本文研究了基于对象的分布式实时系统,其中对象为实时任务提供系统服务。每个任务都受时间/效用函数(TUF)的约束,该函数根据任务的完成时间确定任务的累积效用。在这样的系统中,一个主要的问题是将对象放置到计算节点上,以使总累积效用最大化。因此,我们提出了一种由两个阶段组成的效用应计目标分布(UAOD)算法。在第一阶段,通过对象放置和复制以及一些类型的截止日期分解和自适应,将计算节点保留给最有利的任务。作为第二阶段,UAOD遵循负载平衡算法,将剩余对象放置在节点上,以服务于不太有利的任务。仿真结果表明,与传统的目标放置方法相比,UAOD算法提高了总累积效用。
{"title":"Utility Accrual Object Distribution in Real-Time Systems","authors":"M. Mohaqeqi, M. Kargahi","doi":"10.1109/ICPADS.2010.99","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.99","url":null,"abstract":"This paper considers object-based distributed real-time systems within which objects provide system services to the real-time tasks. Each task is subject to a time/utility function (TUF) which determines the accrued utility of the task according to its completion time. One major problem in such systems is to place the objects onto the computing nodes so as to maximize the total accrued utility. Thus, we propose a utility accrual object distribution (UAOD) algorithm which consists of two phases. In the first phase, through object placement and replication beside some types of deadline decomposition and adaptation, the computing nodes are reserved for the most beneficial tasks. As the second phase, UAOD follows a load-balancing algorithm for the placement of the remaining objects on the nodes to service the less beneficial tasks. Simulation results reveal that the total accrued utility is improved with the UAOD algorithm comparing to the traditional object placement methods.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132410999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Motion Tracking Based on Boolean Compressive Infrared Sampling 基于布尔压缩红外采样的运动跟踪
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.126
Jun Liu, Xuemei Guo, Min Liu, Guoli Wang
This paper concerns the issue of motion tracking with Bayesian filtering driven by boolean compressive infrared sampling. In particular, this paper proposes an implementation of boolean compressive infrared sampling modality, and a measurement transformation method which maps the presence state recovered from boolean compressive infrared sampling into functional measurement for Bayesian filtering with a functional vector quantizer. Simulation studies are reported to validate the proposed transformation method in motion tracking.
研究了布尔压缩红外采样驱动的贝叶斯滤波运动跟踪问题。特别地,本文提出了一种布尔压缩红外采样模式的实现方法,以及一种测量转换方法,该方法将布尔压缩红外采样恢复的存在状态映射到贝叶斯滤波的泛函测量中,并使用泛函矢量量化器。仿真研究验证了该变换方法在运动跟踪中的有效性。
{"title":"Motion Tracking Based on Boolean Compressive Infrared Sampling","authors":"Jun Liu, Xuemei Guo, Min Liu, Guoli Wang","doi":"10.1109/ICPADS.2010.126","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.126","url":null,"abstract":"This paper concerns the issue of motion tracking with Bayesian filtering driven by boolean compressive infrared sampling. In particular, this paper proposes an implementation of boolean compressive infrared sampling modality, and a measurement transformation method which maps the presence state recovered from boolean compressive infrared sampling into functional measurement for Bayesian filtering with a functional vector quantizer. Simulation studies are reported to validate the proposed transformation method in motion tracking.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2010 IEEE 16th International Conference on Parallel and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1