首页 > 最新文献

2010 IEEE 16th International Conference on Parallel and Distributed Systems最新文献

英文 中文
SCAS: Sensing Channel ASsignment for Spectrum Sensing Using Dedicated Wireless Sensor Networks SCAS:使用专用无线传感器网络进行频谱传感的传感信道分配
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.118
Min Gao, Lan Cheng, Yunhuai Liu, L. Ni
Spectrum sensing is essential for the success of the cognitive radio networks. In traditional spectrum sensing schemes, Secondary Users (SUs) are responsible for the spectrum sensing which could be very time and resource consuming. It leads to a great deal of inefficiency in spectrum usage and introduces many practical challenges. To tackle these challenges and leverage the spectrum opportunity more efficiently, we propose a new system that provides a spectrum sensing service for SUs using dedicated wireless spectrum sensor networks (WSSNs). In this paper we focus on the sensing channel assignment problem in WSSNs and formulate the problem as a Sensing Effectiveness Maximization Problem (SEMP). We prove that SEMP is NP-complete under the ideal case, and show that the more challenges arises in real environments. To address the issues, we systematically study the design tradeoff and critical factors when maximizing the sensing effectiveness. Based on these study results we propose a Sensing Channel Assignment algorithm (SCAS). We conduct test-bed empirical investigations as well as comprehensive simulations. Performance evaluation results show that for both the scenarios of given deployments and manual deployments, SCAS is able to sense more channels to improve the sensing effectiveness. The improvement is up to 300% and the average improvement is 150% compared with other simple alternatives.
频谱感知对于认知无线电网络的成功至关重要。在传统的频谱感知方案中,由辅助用户(Secondary user, su)负责频谱感知,这将耗费大量的时间和资源。它导致频谱使用效率低下,并带来了许多实际挑战。为了应对这些挑战并更有效地利用频谱机会,我们提出了一种新的系统,该系统使用专用无线频谱传感器网络(wssn)为SUs提供频谱感知服务。本文主要研究wsns中的感知信道分配问题,并将该问题表述为感知效率最大化问题(SEMP)。我们证明了SEMP在理想情况下是np完全的,并表明在真实环境中会出现更多的挑战。为了解决这些问题,我们系统地研究了最大化传感效率时的设计权衡和关键因素。在此基础上,提出了一种感知信道分配算法(SCAS)。我们进行试验台实证调查以及全面的模拟。性能评估结果表明,对于给定部署场景和手动部署场景,SCAS都能够感知更多通道,从而提高感知效率。与其他简单的替代方案相比,改进幅度高达300%,平均改进幅度为150%。
{"title":"SCAS: Sensing Channel ASsignment for Spectrum Sensing Using Dedicated Wireless Sensor Networks","authors":"Min Gao, Lan Cheng, Yunhuai Liu, L. Ni","doi":"10.1109/ICPADS.2010.118","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.118","url":null,"abstract":"Spectrum sensing is essential for the success of the cognitive radio networks. In traditional spectrum sensing schemes, Secondary Users (SUs) are responsible for the spectrum sensing which could be very time and resource consuming. It leads to a great deal of inefficiency in spectrum usage and introduces many practical challenges. To tackle these challenges and leverage the spectrum opportunity more efficiently, we propose a new system that provides a spectrum sensing service for SUs using dedicated wireless spectrum sensor networks (WSSNs). In this paper we focus on the sensing channel assignment problem in WSSNs and formulate the problem as a Sensing Effectiveness Maximization Problem (SEMP). We prove that SEMP is NP-complete under the ideal case, and show that the more challenges arises in real environments. To address the issues, we systematically study the design tradeoff and critical factors when maximizing the sensing effectiveness. Based on these study results we propose a Sensing Channel Assignment algorithm (SCAS). We conduct test-bed empirical investigations as well as comprehensive simulations. Performance evaluation results show that for both the scenarios of given deployments and manual deployments, SCAS is able to sense more channels to improve the sensing effectiveness. The improvement is up to 300% and the average improvement is 150% compared with other simple alternatives.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Virtual Machine Deployment in Large Scale Resource Environment 大规模资源环境下的高效虚拟机部署
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.72
Feng Huang, Dongsheng Li
Combining virtual machine technology, virtual computing is able to effectively aggregate the widely distributed resources to provide users services. We view the federation of multiple data centers and voluntary resources on the Internet as a very large scale resource pool. Based on the tree structure of the pool, this paper proposes a virtual machine deployment algorithm, called iVDA, considers users’ requests and the capabilities of the physical resources as well as the dynamic load, implements an adaptive mechanism to scheduling servers to host virtual machines forming virtual execution environments for various applications, and supports on-demand computing.
虚拟计算结合虚拟机技术,能够有效地将广泛分布的资源进行聚合,为用户提供服务。我们将Internet上多个数据中心和自愿资源的联合视为一个非常大规模的资源池。基于池的树形结构,本文提出了一种虚拟机部署算法iVDA,该算法考虑用户的请求和物理资源的能力以及动态负载,实现了一种自适应机制来调度服务器到托管虚拟机,形成各种应用的虚拟执行环境,并支持按需计算。
{"title":"Efficient Virtual Machine Deployment in Large Scale Resource Environment","authors":"Feng Huang, Dongsheng Li","doi":"10.1109/ICPADS.2010.72","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.72","url":null,"abstract":"Combining virtual machine technology, virtual computing is able to effectively aggregate the widely distributed resources to provide users services. We view the federation of multiple data centers and voluntary resources on the Internet as a very large scale resource pool. Based on the tree structure of the pool, this paper proposes a virtual machine deployment algorithm, called iVDA, considers users’ requests and the capabilities of the physical resources as well as the dynamic load, implements an adaptive mechanism to scheduling servers to host virtual machines forming virtual execution environments for various applications, and supports on-demand computing.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128821100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CANSE: A Churn Adaptive Approach to Network Size Estimation CANSE:一种自适应的网络大小估计方法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.45
Xingkong Ma, Yi-Jie Wang, Zhong Zheng
Network size is one of the fundamental information of distributed applications. The approach to estimate network size must feature both high accuracy and robustness in order to adapt to the dynamic environment in different topologies. However, existing approaches fail to guarantee accuracy and robustness simultaneously in dynamic topologies due to the randomness of nodes sampled. In this paper, we propose a churn adaptive approach to network size estimation – CANSE, which collects closest nodes in identification to each node’s identification by sampling nodes periodically. Each node collects closest identifications by two schemes. One scheme is sampling random nodes from random walks along the topology. The other one is exchanging the closest identifications with other nodes. Finally, each node calculates the average spacing of the closest identifications collected to estimate network size. Compared with existing approaches, extensive experiments show that CANSE provides accurate estimation values quickly in various dynamic topologies.
网络大小是分布式应用的基本信息之一。为了适应不同拓扑结构下的动态环境,网络大小估计方法必须具有较高的准确性和鲁棒性。然而,由于采样节点的随机性,现有方法无法同时保证动态拓扑中的准确性和鲁棒性。本文提出了一种自适应的网络大小估计方法——CANSE,该方法通过对节点进行周期性采样,收集与每个节点的识别最接近的节点。每个节点通过两种方案收集最接近的标识。一种方案是从沿着拓扑的随机行走中抽取随机节点。另一个是与其他节点交换最接近的标识。最后,每个节点计算收集到的最接近标识的平均间距,以估计网络大小。与现有的方法相比,大量的实验表明,CANSE可以在各种动态拓扑下快速提供准确的估计值。
{"title":"CANSE: A Churn Adaptive Approach to Network Size Estimation","authors":"Xingkong Ma, Yi-Jie Wang, Zhong Zheng","doi":"10.1109/ICPADS.2010.45","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.45","url":null,"abstract":"Network size is one of the fundamental information of distributed applications. The approach to estimate network size must feature both high accuracy and robustness in order to adapt to the dynamic environment in different topologies. However, existing approaches fail to guarantee accuracy and robustness simultaneously in dynamic topologies due to the randomness of nodes sampled. In this paper, we propose a churn adaptive approach to network size estimation – CANSE, which collects closest nodes in identification to each node’s identification by sampling nodes periodically. Each node collects closest identifications by two schemes. One scheme is sampling random nodes from random walks along the topology. The other one is exchanging the closest identifications with other nodes. Finally, each node calculates the average spacing of the closest identifications collected to estimate network size. Compared with existing approaches, extensive experiments show that CANSE provides accurate estimation values quickly in various dynamic topologies.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126890464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ILGT: Group Reputation Aggregation Method for Unstructured Peer-to-Peer Networks 非结构化点对点网络的组声誉聚合方法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.87
A. Matsumoto, Yo Mashimo, Masanori Yasutomi, H. Shigeno
Reputation aggregation methods in unstructured Peer-to-Peer(P2P) networks are used to evaluate the trustworthiness of participating peers and to combat malicious peer’s behaviors. In the reputation aggregation method, each peer calculates global scores by aggregating local scores which are obtained from each peer in P2P networks. In structured P2P networks, each peer exchanges local scores with other peers. Gossip Trust is proposed as a reputation aggregation method for the unstructured P2P networks. However, Gossip Trust has problem that high frequency of munications and long aggregation time increase as the number of peers in the network increase. In this paper, we propose a reputation aggregation method called ”ID-List based Group Trust(ILGT)”. ILGT limits the number of peers that icipate in reputation aggregation process and share the global scores by using list of ID. And ILGT improves communication frequency and aggregation time. Through computer simulations, we compare the proposed method ILGT with Gossip Trust.
在非结构化点对点网络中,信誉聚合方法用于评估参与节点的可信度和打击恶意节点的行为。信誉聚合方法是在P2P网络中,每个对等体通过汇总从每个对等体获得的本地分数来计算全局分数。在结构化的P2P网络中,每个对等点与其他对等点交换本地分数。本文提出了一种用于非结构化P2P网络的信誉聚合方法。但是,随着网络中对等体数量的增加,Gossip Trust存在通信频率高、聚合时间长等问题。本文提出了一种基于ID-List的群组信任(ILGT)的信誉聚合方法。ILGT通过使用ID列表来限制参与声誉聚合过程的对等体数量并共享全局分数。ILGT提高了通信频率和聚合时间。通过计算机仿真,将该方法与Gossip Trust进行了比较。
{"title":"ILGT: Group Reputation Aggregation Method for Unstructured Peer-to-Peer Networks","authors":"A. Matsumoto, Yo Mashimo, Masanori Yasutomi, H. Shigeno","doi":"10.1109/ICPADS.2010.87","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.87","url":null,"abstract":"Reputation aggregation methods in unstructured Peer-to-Peer(P2P) networks are used to evaluate the trustworthiness of participating peers and to combat malicious peer’s behaviors. In the reputation aggregation method, each peer calculates global scores by aggregating local scores which are obtained from each peer in P2P networks. In structured P2P networks, each peer exchanges local scores with other peers. Gossip Trust is proposed as a reputation aggregation method for the unstructured P2P networks. However, Gossip Trust has problem that high frequency of munications and long aggregation time increase as the number of peers in the network increase. In this paper, we propose a reputation aggregation method called ”ID-List based Group Trust(ILGT)”. ILGT limits the number of peers that icipate in reputation aggregation process and share the global scores by using list of ID. And ILGT improves communication frequency and aggregation time. Through computer simulations, we compare the proposed method ILGT with Gossip Trust.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126050357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detection of Behavioral Contextual Properties in Asynchronous Pervasive Computing Environments 异步普适计算环境中行为上下文属性的检测
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.24
Yu Huang, Jianping Yu, Jiannong Cao, Xianping Tao
Detection of contextual properties is one of the primary approaches to enabling context-awareness. In order to adapt to temporal evolution of the pervasive computing environment, context-aware applications often need to detect behavioral properties specified over the contexts. This problem is challenging mainly due to the intrinsic asynchrony of pervasive computing environments. However, existing schemes implicitly assume the availability of a global clock or synchronous coordination, thus not working in asynchronous environments. We argue that in pervasive computing environments, the concept of time needs to be reexamined. Toward this objective, we propose the Ordering Global Activity (OGA) algorithm, which detects behavioral contextual properties in asynchronous environments. The essence of our approach is to utilize the message causality and its on-the-fly coding as logical vector clocks. The OGA algorithm is implemented and evaluated based on the open-source context-aware middleware MIPA. The evaluation results show the impact of asynchrony on the detection of contextual properties, which justifies the primary motivation of our work. They also show that OGA can achieve accurate detection of contextual properties in dynamic pervasive computing environments.
上下文属性检测是启用上下文感知的主要方法之一。为了适应普适计算环境的时间演变,上下文感知应用程序通常需要检测在上下文上指定的行为属性。这个问题之所以具有挑战性,主要是因为普适计算环境固有的异步性。然而,现有的方案隐式地假设了全局时钟或同步协调的可用性,因此不能在异步环境中工作。我们认为,在普适计算环境中,时间的概念需要重新审视。为了实现这一目标,我们提出了排序全局活动(ordered Global Activity, OGA)算法,该算法检测异步环境中的行为上下文属性。我们方法的本质是利用消息因果关系及其动态编码作为逻辑矢量时钟。OGA算法是基于开源的上下文感知中间件MIPA实现和评估的。评估结果显示了异步对上下文属性检测的影响,这证明了我们工作的主要动机。它们还表明,OGA可以在动态普适计算环境中实现上下文属性的准确检测。
{"title":"Detection of Behavioral Contextual Properties in Asynchronous Pervasive Computing Environments","authors":"Yu Huang, Jianping Yu, Jiannong Cao, Xianping Tao","doi":"10.1109/ICPADS.2010.24","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.24","url":null,"abstract":"Detection of contextual properties is one of the primary approaches to enabling context-awareness. In order to adapt to temporal evolution of the pervasive computing environment, context-aware applications often need to detect behavioral properties specified over the contexts. This problem is challenging mainly due to the intrinsic asynchrony of pervasive computing environments. However, existing schemes implicitly assume the availability of a global clock or synchronous coordination, thus not working in asynchronous environments. We argue that in pervasive computing environments, the concept of time needs to be reexamined. Toward this objective, we propose the Ordering Global Activity (OGA) algorithm, which detects behavioral contextual properties in asynchronous environments. The essence of our approach is to utilize the message causality and its on-the-fly coding as logical vector clocks. The OGA algorithm is implemented and evaluated based on the open-source context-aware middleware MIPA. The evaluation results show the impact of asynchrony on the detection of contextual properties, which justifies the primary motivation of our work. They also show that OGA can achieve accurate detection of contextual properties in dynamic pervasive computing environments.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Self-Stabilizing Locality-Aware Peer-to-Peer Network Combining Random Networks, Search Trees, and DHTs 结合随机网络、搜索树和dht的自稳定位置感知点对点网络
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.42
T. Janson, P. Mahlmann, C. Schindelhauer
We present 3nuts, a self-stabilizing peer-to-peer (p2p) network supporting range queries and adapting the overlay structure to the underlying physical network. 3nuts combines concepts of structured and unstructured p2p networks to over-come their individual shortcomings while keeping their strengths. This is achieved by combining self maintaining random networks for robustness, a search tree to allow range queries, and DHTs for load balancing. Simple handshake operations with provable guarantees are used for maintenance and self-stabilization. Efficiency of load balancing, fast data access, and robustness are proven by rigorous analysis.
我们提出了一个自稳定的点对点(p2p)网络3nuts,它支持范围查询,并使覆盖结构适应底层物理网络。3nuts结合了结构化和非结构化p2p网络的概念,在保持各自优势的同时克服了各自的缺点。这是通过结合自我维护的随机网络来实现鲁棒性,结合搜索树来允许范围查询,结合dht来实现负载平衡。简单的握手操作与可证明的保证用于维护和自稳定。通过严格的分析,证明了负载均衡的效率、快速的数据访问和鲁棒性。
{"title":"A Self-Stabilizing Locality-Aware Peer-to-Peer Network Combining Random Networks, Search Trees, and DHTs","authors":"T. Janson, P. Mahlmann, C. Schindelhauer","doi":"10.1109/ICPADS.2010.42","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.42","url":null,"abstract":"We present 3nuts, a self-stabilizing peer-to-peer (p2p) network supporting range queries and adapting the overlay structure to the underlying physical network. 3nuts combines concepts of structured and unstructured p2p networks to over-come their individual shortcomings while keeping their strengths. This is achieved by combining self maintaining random networks for robustness, a search tree to allow range queries, and DHTs for load balancing. Simple handshake operations with provable guarantees are used for maintenance and self-stabilization. Efficiency of load balancing, fast data access, and robustness are proven by rigorous analysis.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Auto-tuning Dense Matrix Multiplication for GPGPU with Cache 带缓存的GPGPU密集矩阵乘法自动调优
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.64
Xiang Cui, Yifeng Chen, Changyou Zhang, Hong Mei
In this paper we discuss about our experiences in improving the performance of GEMM (both single and double precision) on Fermi architecture using CUDA, and how the new features of Fermi such as cache affect performance. It is found that the addition of cache in GPU on one hand helps the processers take advantage of data locality occurred in runtime but on the other hand renders the dependency of performance on algorithmic parameters less predictable. Auto tuning then becomes a useful technique to address this issue. Our auto-tuned SGEMM and DGEMM reach 563 GFlops and 253 GFlops respectively on Tesla C2050. The design and implementation entirely use CUDA and C and have not benefited from tuning at the level of binary code.
在本文中,我们讨论了我们使用CUDA在Fermi架构上提高GEMM(单精度和双精度)性能的经验,以及Fermi的新特性(如缓存)如何影响性能。研究发现,在GPU中增加缓存一方面有助于处理器利用运行时发生的数据局部性,但另一方面使性能对算法参数的依赖性变得不可预测。自动调优成为解决这个问题的有用技术。我们的自动调谐SGEMM和DGEMM在Tesla C2050上分别达到563 GFlops和253 GFlops。设计和实现完全使用CUDA和C,并且没有从二进制代码级别的调优中受益。
{"title":"Auto-tuning Dense Matrix Multiplication for GPGPU with Cache","authors":"Xiang Cui, Yifeng Chen, Changyou Zhang, Hong Mei","doi":"10.1109/ICPADS.2010.64","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.64","url":null,"abstract":"In this paper we discuss about our experiences in improving the performance of GEMM (both single and double precision) on Fermi architecture using CUDA, and how the new features of Fermi such as cache affect performance. It is found that the addition of cache in GPU on one hand helps the processers take advantage of data locality occurred in runtime but on the other hand renders the dependency of performance on algorithmic parameters less predictable. Auto tuning then becomes a useful technique to address this issue. Our auto-tuned SGEMM and DGEMM reach 563 GFlops and 253 GFlops respectively on Tesla C2050. The design and implementation entirely use CUDA and C and have not benefited from tuning at the level of binary code.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132542603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
DSpam: Defending Against Spam in Tagging Systems via Users' Reliability 垃圾邮件:通过用户可靠性防御标签系统中的垃圾邮件
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.63
Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhao Wang, Jian-bin Hu, Zhong Chen
Resisting spam in tagging system is very challenging. This paper presents DSpam, a novel spam-resistant tagging system which can significantly diminish spam in tag search results with users’ reliabilities. DSpam client groups other users into unfamiliar users and interacted users according to the fact whether the client has interacted with such users. For an unfamiliar user, the client computes his reliability by tagging behavior-based mechanism which reflects correlation of annotations between them. For an interacted user, the reliability includes two parts: feedback-based reliability, which indicates direct interactions between that user and the client, and recommendation reliability, which indicates the evaluation about that user from the client’s friends. The client ranks search result with the average reliabilities of himself with respect to annotators of each result. Experimental results show DSpam can effectively resist tag spam and work better than existing tag search schemes.
在标签系统中抵制垃圾邮件是一个非常具有挑战性的问题。本文提出了一种新的抗垃圾标签系统DSpam,该系统可以在用户可靠性的基础上显著减少垃圾标签搜索结果。DSpam客户端根据客户端是否与陌生用户进行过交互,将其他用户划分为陌生用户和交互用户。对于不熟悉的用户,客户端通过基于行为的标记机制来计算其可靠性,该机制反映了他们之间注释的相关性。对于交互用户,信度包括两部分:基于反馈的信度,表示用户与客户端之间的直接交互;推荐信度,表示客户端朋友对该用户的评价。客户根据自己对每个结果的注释者的平均可靠性对搜索结果进行排序。实验结果表明,DSpam可以有效地抵抗垃圾标签,并且比现有的标签搜索方案效果更好。
{"title":"DSpam: Defending Against Spam in Tagging Systems via Users' Reliability","authors":"Yonggang Wang, Ennan Zhai, Cui Cao, Yongqiang Xie, Zhao Wang, Jian-bin Hu, Zhong Chen","doi":"10.1109/ICPADS.2010.63","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.63","url":null,"abstract":"Resisting spam in tagging system is very challenging. This paper presents DSpam, a novel spam-resistant tagging system which can significantly diminish spam in tag search results with users’ reliabilities. DSpam client groups other users into unfamiliar users and interacted users according to the fact whether the client has interacted with such users. For an unfamiliar user, the client computes his reliability by tagging behavior-based mechanism which reflects correlation of annotations between them. For an interacted user, the reliability includes two parts: feedback-based reliability, which indicates direct interactions between that user and the client, and recommendation reliability, which indicates the evaluation about that user from the client’s friends. The client ranks search result with the average reliabilities of himself with respect to annotators of each result. Experimental results show DSpam can effectively resist tag spam and work better than existing tag search schemes.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133139500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mixed-Parallel Implementations of Extrapolation Methods with Reduced Synchronization Overhead for Large Shared-Memory Computers 大型共享内存计算机中减少同步开销外推方法的混合并行实现
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.12
Matthias Korch, T. Rauber, C. Scholtes
Extrapolation methods belong to the class of one-step methods for the solution of systems of ordinary differential equations (ODEs). In this paper, we present parallel implementation variants of extrapolation methods for large shared-memory computer systems which exploit pure data parallelism or mixed task and data parallelism and make use of different load balancing strategies and different loop structures. In addition to general implementation variants suitable for ODE systems with arbitrary access structure, we devise specialized implementation variants which exploit the specific access structure of a large class of ODE systems to reduce synchronization costs and to improve the locality of memory references. We analyze and compare the scalability and the locality behavior of the implementation variants on an SGI Altix 4700 using up to 500 threads.
外推法属于求解常微分方程组的一步法。本文提出了针对大型共享内存计算机系统的外推方法的并行实现变体,这些外推方法利用纯数据并行性或混合任务和数据并行性,并利用不同的负载平衡策略和不同的循环结构。除了适用于具有任意访问结构的ODE系统的通用实现变体外,我们还设计了专门的实现变体,利用大量ODE系统的特定访问结构来降低同步成本并改善内存引用的局部性。我们分析和比较了SGI Altix 4700上使用多达500个线程的实现变体的可伸缩性和局部性行为。
{"title":"Mixed-Parallel Implementations of Extrapolation Methods with Reduced Synchronization Overhead for Large Shared-Memory Computers","authors":"Matthias Korch, T. Rauber, C. Scholtes","doi":"10.1109/ICPADS.2010.12","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.12","url":null,"abstract":"Extrapolation methods belong to the class of one-step methods for the solution of systems of ordinary differential equations (ODEs). In this paper, we present parallel implementation variants of extrapolation methods for large shared-memory computer systems which exploit pure data parallelism or mixed task and data parallelism and make use of different load balancing strategies and different loop structures. In addition to general implementation variants suitable for ODE systems with arbitrary access structure, we devise specialized implementation variants which exploit the specific access structure of a large class of ODE systems to reduce synchronization costs and to improve the locality of memory references. We analyze and compare the scalability and the locality behavior of the implementation variants on an SGI Altix 4700 using up to 500 threads.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Broadcasting Algorithm Via Shortest Paths 基于最短路径的广播算法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.110
Hovhannes A. Harutyunyan, Wei Wang
In this paper, we present a new heuristic that generates broadcast schemes in arbitrary networks. The heuristic gives optimal broadcast time for ring, tree and grid if the originator is on the corner. Extensive simulations show that our new heuristic outperforms the best known broadcast algorithms for two different network models representing Internet and ATM networks. It also allows to generate broadcast time of networks of bigger size because its time complexity, O(|E|), is lower compared to the complexities of the other algorithms. The last advantage of the heuristic is that every node is informed via a shortest path from the originator.
本文提出了一种在任意网络中生成广播方案的启发式算法。当发信人在角落时,启发式给出环、树和网格的最优广播时间。大量的模拟表明,对于代表Internet和ATM网络的两种不同网络模型,我们的新启发式算法优于最知名的广播算法。它还允许生成更大规模网络的广播时间,因为它的时间复杂度O(|E|)比其他算法的复杂性低。启发式的最后一个优点是,每个节点都是通过从始发点出发的最短路径通知的。
{"title":"Broadcasting Algorithm Via Shortest Paths","authors":"Hovhannes A. Harutyunyan, Wei Wang","doi":"10.1109/ICPADS.2010.110","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.110","url":null,"abstract":"In this paper, we present a new heuristic that generates broadcast schemes in arbitrary networks. The heuristic gives optimal broadcast time for ring, tree and grid if the originator is on the corner. Extensive simulations show that our new heuristic outperforms the best known broadcast algorithms for two different network models representing Internet and ATM networks. It also allows to generate broadcast time of networks of bigger size because its time complexity, O(|E|), is lower compared to the complexities of the other algorithms. The last advantage of the heuristic is that every node is informed via a shortest path from the originator.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114756096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2010 IEEE 16th International Conference on Parallel and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1