首页 > 最新文献

2010 IEEE 16th International Conference on Parallel and Distributed Systems最新文献

英文 中文
A VMM-Based System Call Interposition Framework for Program Monitoring 基于vmm的程序监控系统调用插入框架
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.53
B. Li, Jianxin Li, Tianyu Wo, Chunming Hu, Liang Zhong
System call interposition is a powerful method for regulating and monitoring program behavior. A wide variety of security tools have been developed which use this technique. However, traditional system call interposition techniques are vulnerable to kernel attacks and have some limitations on effectiveness and transparency. In this paper, we propose a novel approach named VSyscall, which leverages virtualization technology to enable system call interposition outside the operating system. A system call correlating method is proposed to identify the coherent system calls belonging to the same process from the system call sequence. We have developed a prototype of VSyscall and implemented it in two mainstream virtual machine monitors, Qemu and KVM, respectively. We also evaluate the effectiveness and performance overhead of our approach by comprehensive experiments. The results show that VSyscall achieves effectiveness with a small overhead, and our experiments with six real-world applications indicate its practicality.
系统调用介入是调节和监控程序行为的一种强有力的方法。使用这种技术开发了各种各样的安全工具。然而,传统的系统调用干预技术容易受到内核攻击,并且在有效性和透明度方面存在一定的限制。在本文中,我们提出了一种名为vsycall的新方法,它利用虚拟化技术在操作系统之外实现系统调用干预。提出了一种系统调用关联方法,从系统调用序列中识别属于同一进程的连贯系统调用。我们开发了一个vsycall的原型,并分别在两种主流的虚拟机监视器Qemu和KVM中实现。我们还通过全面的实验来评估我们的方法的有效性和性能开销。结果表明,vsycall以很小的开销实现了有效性,我们对六个实际应用程序的实验表明了它的实用性。
{"title":"A VMM-Based System Call Interposition Framework for Program Monitoring","authors":"B. Li, Jianxin Li, Tianyu Wo, Chunming Hu, Liang Zhong","doi":"10.1109/ICPADS.2010.53","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.53","url":null,"abstract":"System call interposition is a powerful method for regulating and monitoring program behavior. A wide variety of security tools have been developed which use this technique. However, traditional system call interposition techniques are vulnerable to kernel attacks and have some limitations on effectiveness and transparency. In this paper, we propose a novel approach named VSyscall, which leverages virtualization technology to enable system call interposition outside the operating system. A system call correlating method is proposed to identify the coherent system calls belonging to the same process from the system call sequence. We have developed a prototype of VSyscall and implemented it in two mainstream virtual machine monitors, Qemu and KVM, respectively. We also evaluate the effectiveness and performance overhead of our approach by comprehensive experiments. The results show that VSyscall achieves effectiveness with a small overhead, and our experiments with six real-world applications indicate its practicality.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Inter-Coding: An Interleaving and Erasure Coding Based Stable Routing Scheme in Multi-path DTN 互编码:一种基于交错和擦除编码的多径DTN稳定路由方案
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.22
Xiaoming Tang, Panlong Yang, Chang Tian, Laixian Peng, Yubo Yan
The main challenge in DTNs is how to deal with path uncertainty in achieving a reliable routing scheme. All Erasure coding based routing algorithms make the assumption that the underlying path probabilities are known previously and remain constant, which is unpractical. On the other hand, the overall behavior of path probability tends to be stable with the increasing number of paths, which can be used to increase the stability of Erasure coding based schemes. Bearing this in mind, we present Inter-Coding: Inter-Coding is designed to fully combine the reliability of erasure coding, and the stability of interleaving to cope with uncertainties. We evaluate our approach in terms of delivery ratio under different level of uncertainty as well as different interleaving policy, and validate that Inter-Coding offers reliable and stable performance even the path uncertainty and dynamic is high.
在实现可靠路由方案时,如何处理路径不确定性是DTNs面临的主要挑战。所有基于Erasure编码的路由算法都假设底层路径概率是已知的并且保持不变,这是不切实际的。另一方面,随着路径数量的增加,路径概率的总体行为趋于稳定,这可以用来提高基于Erasure编码的方案的稳定性。考虑到这一点,我们提出了Inter-Coding: Inter-Coding的设计充分结合了擦除编码的可靠性和交错编码的稳定性来应对不确定性。从不同不确定度和不同交错策略下的传输率进行了评价,验证了在路径不确定性和动态性较高的情况下,互编码仍然具有可靠和稳定的性能。
{"title":"Inter-Coding: An Interleaving and Erasure Coding Based Stable Routing Scheme in Multi-path DTN","authors":"Xiaoming Tang, Panlong Yang, Chang Tian, Laixian Peng, Yubo Yan","doi":"10.1109/ICPADS.2010.22","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.22","url":null,"abstract":"The main challenge in DTNs is how to deal with path uncertainty in achieving a reliable routing scheme. All Erasure coding based routing algorithms make the assumption that the underlying path probabilities are known previously and remain constant, which is unpractical. On the other hand, the overall behavior of path probability tends to be stable with the increasing number of paths, which can be used to increase the stability of Erasure coding based schemes. Bearing this in mind, we present Inter-Coding: Inter-Coding is designed to fully combine the reliability of erasure coding, and the stability of interleaving to cope with uncertainties. We evaluate our approach in terms of delivery ratio under different level of uncertainty as well as different interleaving policy, and validate that Inter-Coding offers reliable and stable performance even the path uncertainty and dynamic is high.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130356083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage BLAST:将流密码应用于外包云存储
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.9
Ki-Woong Park, Chulmin Kim, K. Park
Providing secure and efficient outsourced storage is a precursor to widespread cloud deployment and availability. For this purpose, existing designs mainly rely on block ciphers, although stream ciphers are more computationally-efficient than block ciphers. This paper presents a construction of secure storage, BLAST, enhanced with a stream cipher rather than a block cipher with a novel block accessible encryption mechanism based on streaming ciphers. In BLAST, a hierarchical tree generated in the form of an n-level quad tree is created for each user during the registration phase of the storage system. When a user wants to access the outsourced storage, the user can access their data after encrypting or decrypting it using a sequence of key stream frames derived from the hierarchical tree. The experimental results show that the proposed system achieves significant improved performance than normal streaming/block cipher-based secure storage system in terms of throughput and access latency.
提供安全高效的外包存储是云部署和可用性普及的先兆。为此,现有的设计主要依赖于分组密码,尽管流密码比分组密码计算效率更高。本文提出了一种基于流密码而不是分组密码增强的安全存储结构BLAST,并提出了一种新的基于流密码的分组可访问加密机制。在BLAST中,在存储系统的注册阶段为每个用户创建以n级四叉树形式生成的层次树。当用户希望访问外包存储时,用户可以在使用从层次树派生的密钥流帧序列对其进行加密或解密后访问其数据。实验结果表明,该系统在吞吐量和访问延迟方面都比普通的基于流/分组密码的安全存储系统有显著提高。
{"title":"BLAST: Applying Streaming Ciphers Into Outsourced Cloud Storage","authors":"Ki-Woong Park, Chulmin Kim, K. Park","doi":"10.1109/ICPADS.2010.9","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.9","url":null,"abstract":"Providing secure and efficient outsourced storage is a precursor to widespread cloud deployment and availability. For this purpose, existing designs mainly rely on block ciphers, although stream ciphers are more computationally-efficient than block ciphers. This paper presents a construction of secure storage, BLAST, enhanced with a stream cipher rather than a block cipher with a novel block accessible encryption mechanism based on streaming ciphers. In BLAST, a hierarchical tree generated in the form of an n-level quad tree is created for each user during the registration phase of the storage system. When a user wants to access the outsourced storage, the user can access their data after encrypting or decrypting it using a sequence of key stream frames derived from the hierarchical tree. The experimental results show that the proposed system achieves significant improved performance than normal streaming/block cipher-based secure storage system in terms of throughput and access latency.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Small-World Social Relationship Awareness in Unstructured Peer-to-Peer Networks 非结构化点对点网络中的小世界社会关系意识
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.37
Hao Liao, Kuo-Chan Huang, Hung-Chang Hsiao
Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest. Empirical measurement studies indicate that the peers in P2P networks have similar preferences, and recently proposed unstructured P2P networks intend to organize the participating peers in a small-world (SW) fashion by exploiting the knowledge of contents stored in peers. As existing algorithms for constructing SW-based unstructured P2P networks may not precisely reveal the object sharing patterns, the resultant networks thus may not perform searches efficiently and effectively by exploiting the common interests among peers. In this paper, we suggest a novel P2P network formation algorithm to construct SW-based unstructured networks. We validate our proposal in simulations with an empirical data set, and the simulation results prove that our proposal greatly outperforms existing algorithms in terms of search efficiency and effectiveness.
非结构化点对点(P2P)文件共享网络在大众市场中很流行。由于参与非结构化网络的对等体是随机互连的,它们依赖于泛洪查询消息来发现感兴趣的对象。实证测量研究表明,P2P网络中的对等体具有相似的偏好,最近提出的非结构化P2P网络旨在利用存储在对等体中的内容知识,以小世界(SW)的方式组织参与的对等体。由于构建基于sw的非结构化P2P网络的现有算法可能无法精确地揭示对象共享模式,因此所得网络可能无法通过利用对等体之间的共同兴趣来高效地执行搜索。在本文中,我们提出了一种新的P2P网络形成算法来构建基于sw的非结构化网络。我们用一个经验数据集在仿真中验证了我们的提议,仿真结果证明我们的提议在搜索效率和有效性方面都大大优于现有的算法。
{"title":"Small-World Social Relationship Awareness in Unstructured Peer-to-Peer Networks","authors":"Hao Liao, Kuo-Chan Huang, Hung-Chang Hsiao","doi":"10.1109/ICPADS.2010.37","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.37","url":null,"abstract":"Unstructured peer-to-peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest. Empirical measurement studies indicate that the peers in P2P networks have similar preferences, and recently proposed unstructured P2P networks intend to organize the participating peers in a small-world (SW) fashion by exploiting the knowledge of contents stored in peers. As existing algorithms for constructing SW-based unstructured P2P networks may not precisely reveal the object sharing patterns, the resultant networks thus may not perform searches efficiently and effectively by exploiting the common interests among peers. In this paper, we suggest a novel P2P network formation algorithm to construct SW-based unstructured networks. We validate our proposal in simulations with an empirical data set, and the simulation results prove that our proposal greatly outperforms existing algorithms in terms of search efficiency and effectiveness.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On Sweep Coverage with Minimum Mobile Sensors 最小移动传感器的扫描覆盖
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.109
Junzhao Du, Yawei Li, Hui Liu, Kewei Sha
For some sensor network applications, the problem of sweep coverage, which periodically covers POIs (Points of Interest) to sense events, is of importance. How to schedule minimum number of mobile sensors to achieve the sweep coverage within specified sweep period is a challenging problem, especially when the POIs to be scanned exceeds certain scale and the speed of mobile sensor is limited. Therefore, multiple mobile sensors are required to collaboratively complete the scanning task. When the mobile sensor is restricted to follow the same trajectory in different sweep periods, we design a centralized algorithm, MinExpand, to schedule the scan path. When the scan path of the existing mobile sensors has been exceeds the length constraint, MinExpand gradually deploys more mobile sensors and eventually achieves sweep coverage to all POIs. When the mobile sensors are not restricted to follow the same trajectory in different sweep periods, we design OSweep algorithm, where all the mobile sensors are scheduled to move along a TSP (Traveling Salesman Problem) ring consists of POIs. We conduct comprehensive simulations to study the performance of the proposed algorithms. The simulation results show that MinExpand and OSweep outperform CSWEEP in both effectiveness and efficiency.
对于某些传感器网络应用来说,扫描覆盖问题(周期性地覆盖感兴趣点以感知事件)是非常重要的。如何在规定的扫描周期内调度最少数量的移动传感器以实现扫描覆盖是一个具有挑战性的问题,特别是当需要扫描的点超过一定的尺度且移动传感器的速度受到限制时。因此,需要多个移动传感器协同完成扫描任务。当移动传感器被限制在不同扫描周期内遵循同一轨迹时,我们设计了一种集中的算法MinExpand来调度扫描路径。当现有移动传感器的扫描路径已经超过长度约束时,MinExpand逐步部署更多的移动传感器,最终实现对所有poi的扫描覆盖。在不限制移动传感器在不同扫描周期内遵循相同轨迹的情况下,设计了一种扫描算法,该算法将所有移动传感器都安排在由poi组成的TSP (Traveling Salesman Problem)环上移动。我们进行了全面的仿真来研究所提出算法的性能。仿真结果表明,MinExpand和sweep在有效性和效率上都优于CSWEEP。
{"title":"On Sweep Coverage with Minimum Mobile Sensors","authors":"Junzhao Du, Yawei Li, Hui Liu, Kewei Sha","doi":"10.1109/ICPADS.2010.109","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.109","url":null,"abstract":"For some sensor network applications, the problem of sweep coverage, which periodically covers POIs (Points of Interest) to sense events, is of importance. How to schedule minimum number of mobile sensors to achieve the sweep coverage within specified sweep period is a challenging problem, especially when the POIs to be scanned exceeds certain scale and the speed of mobile sensor is limited. Therefore, multiple mobile sensors are required to collaboratively complete the scanning task. When the mobile sensor is restricted to follow the same trajectory in different sweep periods, we design a centralized algorithm, MinExpand, to schedule the scan path. When the scan path of the existing mobile sensors has been exceeds the length constraint, MinExpand gradually deploys more mobile sensors and eventually achieves sweep coverage to all POIs. When the mobile sensors are not restricted to follow the same trajectory in different sweep periods, we design OSweep algorithm, where all the mobile sensors are scheduled to move along a TSP (Traveling Salesman Problem) ring consists of POIs. We conduct comprehensive simulations to study the performance of the proposed algorithms. The simulation results show that MinExpand and OSweep outperform CSWEEP in both effectiveness and efficiency.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122415314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A Discrete Event Simulation Model for Understanding Kernel Lock Thrashing on Multi-core Architectures 一种用于理解多核体系结构上内核锁振荡的离散事件仿真模型
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.28
Yan Cui, Weiyi Wu, Yingxin Wang, Xufeng Guo, Yu Chen, Yuanchun Shi
Multi-core architectures have become mainstream. Trends suggest that the number of cores integrated on a single chip will increase continuously. However, lock contention in operating systems can limit the parallel scalability on multi-cores so significantly that the speedup decreases with the increasing number of cores (thrashing). Although the phenomenon can be easily reproduced experimentally, most existing lock models are not able to do so. To overcome this challenge, this paper develops a discrete event simulation model which has the capability of capturing both the sequential execution in critical sections and the contention for shared hardware resources. The model is evaluated using a series of typical parameter configurations which can represent different degrees of lock contention. Experimental results suggest that the thrashing phenomenon can be observed when the model parameters are selected properly. To further understand this phenomenon, statistics such as the percentage of time spent waiting for locks and the number of cores waiting for a lock are exploited to characterize the lock thrashing. In addition, the model sensitivity to changes in memory latency and hardware architectures are also examined. Finally, we use this model to compare three methods which are proposed for preventing the lock thrashing.
多核架构已经成为主流。趋势表明,单个芯片上集成的核心数量将不断增加。然而,操作系统中的锁争用会极大地限制多核上的并行可伸缩性,以至于加速会随着核数的增加而降低(抖动)。虽然这种现象可以很容易地在实验中重现,但大多数现有的锁模型都无法做到这一点。为了克服这一挑战,本文开发了一种离散事件仿真模型,该模型具有捕获临界区顺序执行和共享硬件资源争用的能力。该模型使用一系列典型的参数配置来评估,这些参数配置可以表示不同程度的锁争用。实验结果表明,在适当选择模型参数的情况下,可以观察到振荡现象。为了进一步理解这种现象,可以利用诸如等待锁所花费的时间百分比和等待锁的核数等统计数据来表征锁抖动。此外,还研究了模型对内存延迟和硬件架构变化的敏感性。最后,我们用这个模型比较了三种防止锁抖动的方法。
{"title":"A Discrete Event Simulation Model for Understanding Kernel Lock Thrashing on Multi-core Architectures","authors":"Yan Cui, Weiyi Wu, Yingxin Wang, Xufeng Guo, Yu Chen, Yuanchun Shi","doi":"10.1109/ICPADS.2010.28","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.28","url":null,"abstract":"Multi-core architectures have become mainstream. Trends suggest that the number of cores integrated on a single chip will increase continuously. However, lock contention in operating systems can limit the parallel scalability on multi-cores so significantly that the speedup decreases with the increasing number of cores (thrashing). Although the phenomenon can be easily reproduced experimentally, most existing lock models are not able to do so. To overcome this challenge, this paper develops a discrete event simulation model which has the capability of capturing both the sequential execution in critical sections and the contention for shared hardware resources. The model is evaluated using a series of typical parameter configurations which can represent different degrees of lock contention. Experimental results suggest that the thrashing phenomenon can be observed when the model parameters are selected properly. To further understand this phenomenon, statistics such as the percentage of time spent waiting for locks and the number of cores waiting for a lock are exploited to characterize the lock thrashing. In addition, the model sensitivity to changes in memory latency and hardware architectures are also examined. Finally, we use this model to compare three methods which are proposed for preventing the lock thrashing.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PMSAI: A Novel Peer-to-Peer Multimedia Streaming Architecture over IMS PMSAI:一种基于IMS的新型点对点多媒体流架构
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.54
Ran Liu, H. Yin, Wen Hui
Deploying multimedia streaming over IP Multimedia Subsystem (IMS) can enable all kinds of user equipments to enjoy unified streaming service, without considering the differences of heterogeneous accessing methods. The combination of IMS and peer-to-peer (P2P) may help operators (especially telecommunication operators) to provide more scalable multimedia streaming. In this paper, we propose PMSAI, a novel P2P multimedia streaming architecture over IMS, in order to expand the capability of IMS multimedia streaming and reduce server side resource consumption, while restricting P2P traffic within local areas and trying best to keep standard IMS unchanged. To study how PMSAI performs, we also build a experimental system of live multimedia streaming. Carefully measurement study demonstrates the feasibility and effectiveness of PMSAI. To the best of our knowledge, PMSAI is the first P2P multimedia streaming architecture over IMS.
在IP多媒体子系统(IMS)上部署多媒体流,可以使各种用户设备享受统一的流服务,而不必考虑异构访问方式的差异。IMS和点对点(P2P)的结合可以帮助运营商(尤其是电信运营商)提供更可扩展的多媒体流。本文提出了一种新的基于IMS的P2P多媒体流架构PMSAI,以扩展IMS多媒体流的能力,减少服务器端资源的消耗,同时将P2P流量限制在局部区域内,并尽量保持标准IMS不变。为了研究PMSAI的性能,我们还建立了一个实时多媒体流媒体实验系统。仔细的测量研究证明了PMSAI的可行性和有效性。据我们所知,PMSAI是第一个基于IMS的P2P多媒体流架构。
{"title":"PMSAI: A Novel Peer-to-Peer Multimedia Streaming Architecture over IMS","authors":"Ran Liu, H. Yin, Wen Hui","doi":"10.1109/ICPADS.2010.54","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.54","url":null,"abstract":"Deploying multimedia streaming over IP Multimedia Subsystem (IMS) can enable all kinds of user equipments to enjoy unified streaming service, without considering the differences of heterogeneous accessing methods. The combination of IMS and peer-to-peer (P2P) may help operators (especially telecommunication operators) to provide more scalable multimedia streaming. In this paper, we propose PMSAI, a novel P2P multimedia streaming architecture over IMS, in order to expand the capability of IMS multimedia streaming and reduce server side resource consumption, while restricting P2P traffic within local areas and trying best to keep standard IMS unchanged. To study how PMSAI performs, we also build a experimental system of live multimedia streaming. Carefully measurement study demonstrates the feasibility and effectiveness of PMSAI. To the best of our knowledge, PMSAI is the first P2P multimedia streaming architecture over IMS.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Load Aware Routing with Delay Threshold for Vehicular Ad Hoc Networks 基于时延阈值的车载Ad Hoc网络负载感知路由
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.74
Yong Feng, Mingyu Fan, Qiwei Xiao, Lishu Wang
It is being envisaged that a wide variety of applications can be running on vehicular ad hoc networks (VANETs) in the near future. The coexistence of these applications suggests that they will be competing for the use of the wireless medium. That easily leads to severe congestion and even “hotspot” problem in high traffic density urban areas, and results in the failure of time-critical applications. To address this issue, we propose two carry-and-forward schemes called LARD-Greedy and LARD-Optimal respectively that attempt to deliver packets along the path with optimal performance. The proposed algorithms leverage local or global knowledge of traffic statistics to choose the path with optimal performance, and rationally alternate between the Carrying and Multihop Forwarding strategies according to the current load status in order to avoid congestion. Experimental results based on a real city map show the proposed solutions reach very good performance in terms of packet delivery ratio and delay.
据设想,在不久的将来,各种各样的应用程序可以在车载自组织网络(vanet)上运行。这些应用程序的共存表明它们将为无线媒体的使用而竞争。在高交通密度的城市地区,这很容易导致严重的拥堵甚至“热点”问题,并导致时间关键型应用的失败。为了解决这个问题,我们提出了两种carry-and-forward方案,分别称为LARD-Greedy和LARD-Optimal,它们试图沿着性能最优的路径传输数据包。该算法利用局部或全局的流量统计知识来选择性能最优的路径,并根据当前负载状态在承载策略和多跳转发策略之间合理交替,以避免拥塞。基于真实城市地图的实验结果表明,所提出的方案在分组传送率和延迟方面都取得了很好的性能。
{"title":"Load Aware Routing with Delay Threshold for Vehicular Ad Hoc Networks","authors":"Yong Feng, Mingyu Fan, Qiwei Xiao, Lishu Wang","doi":"10.1109/ICPADS.2010.74","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.74","url":null,"abstract":"It is being envisaged that a wide variety of applications can be running on vehicular ad hoc networks (VANETs) in the near future. The coexistence of these applications suggests that they will be competing for the use of the wireless medium. That easily leads to severe congestion and even “hotspot” problem in high traffic density urban areas, and results in the failure of time-critical applications. To address this issue, we propose two carry-and-forward schemes called LARD-Greedy and LARD-Optimal respectively that attempt to deliver packets along the path with optimal performance. The proposed algorithms leverage local or global knowledge of traffic statistics to choose the path with optimal performance, and rationally alternate between the Carrying and Multihop Forwarding strategies according to the current load status in order to avoid congestion. Experimental results based on a real city map show the proposed solutions reach very good performance in terms of packet delivery ratio and delay.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115465581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Complex Network Based Virtual Computing Environment Topology Generating Method 基于复杂网络的虚拟计算环境拓扑生成方法
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.69
Xiaoheng Deng, Yi Liu, Fu-Yao Zhao, Zhigang Chen
The topologies of Internet and Internet-based information systems have complex network properties. Designing Internet-based virtual computing environment topology with appropriate properties is significant for both the resource sharing and system performance. We analyses the topology properties of the typical P2P systems, and proposes a new topology generating method, which includes three phases, birth, growth and maturity, and supports multi-node concurrent joining in. The iVCE topology generation method can produce stable structure, with load balancing capability. Analysis of the generated topologies shows that the degree of their super-node obeys normal distribution law, the average path length between nodes shows small-world properties.
Internet和基于Internet的信息系统的拓扑结构具有复杂的网络特性。设计具有适当属性的基于internet的虚拟计算环境拓扑对于资源共享和系统性能都具有重要意义。分析了典型P2P系统的拓扑特性,提出了一种新的拓扑生成方法,该方法包括诞生、成长和成熟三个阶段,并支持多节点并发加入。该方法生成的拓扑结构稳定,具有负载均衡能力。对生成的拓扑结构分析表明,它们的超级节点的程度服从正态分布规律,节点间的平均路径长度具有小世界特性。
{"title":"A Complex Network Based Virtual Computing Environment Topology Generating Method","authors":"Xiaoheng Deng, Yi Liu, Fu-Yao Zhao, Zhigang Chen","doi":"10.1109/ICPADS.2010.69","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.69","url":null,"abstract":"The topologies of Internet and Internet-based information systems have complex network properties. Designing Internet-based virtual computing environment topology with appropriate properties is significant for both the resource sharing and system performance. We analyses the topology properties of the typical P2P systems, and proposes a new topology generating method, which includes three phases, birth, growth and maturity, and supports multi-node concurrent joining in. The iVCE topology generation method can produce stable structure, with load balancing capability. Analysis of the generated topologies shows that the degree of their super-node obeys normal distribution law, the average path length between nodes shows small-world properties.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114888357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Power Aware Scheduling for Parallel Tasks via Task Clustering 基于任务集群的并行任务的功率感知调度
Pub Date : 2010-12-08 DOI: 10.1109/ICPADS.2010.128
Lizhe Wang, J. Tao, G. Laszewski, Dan Chen
It has been widely known that various benefits can be achieved by reducing energy consumption for high end computing. This paper aims to develop power aware scheduling heuristics for parallel tasks in a cluster with the DVFS technique. In this paper, formal models are presented for precedenceconstrained parallel tasks, DVFS enabled clusters, and energy consumption. This paper studies the slack time for non-critical jobs, extends their execution time and reduces the energy consumption without increasing the task’s execution time as a whole. This paper develops a power aware task clustering algorithm for parallel task scheduling Simulation results justify the design and implementation of proposed energy aware scheduling heuristics in the paper.
众所周知,通过降低高端计算的能耗可以获得各种好处。本文旨在利用DVFS技术开发集群中并行任务的功率感知调度启发式算法。在本文中,提出了优先级约束的并行任务、支持DVFS的集群和能耗的形式化模型。研究非关键作业的松弛时间,在不增加任务整体执行时间的前提下,延长非关键作业的执行时间,降低能耗。本文提出了一种用于并行任务调度的能量感知任务聚类算法,仿真结果证明了本文提出的能量感知调度启发式算法的设计和实现是正确的。
{"title":"Power Aware Scheduling for Parallel Tasks via Task Clustering","authors":"Lizhe Wang, J. Tao, G. Laszewski, Dan Chen","doi":"10.1109/ICPADS.2010.128","DOIUrl":"https://doi.org/10.1109/ICPADS.2010.128","url":null,"abstract":"It has been widely known that various benefits can be achieved by reducing energy consumption for high end computing. This paper aims to develop power aware scheduling heuristics for parallel tasks in a cluster with the DVFS technique. In this paper, formal models are presented for precedenceconstrained parallel tasks, DVFS enabled clusters, and energy consumption. This paper studies the slack time for non-critical jobs, extends their execution time and reduces the energy consumption without increasing the task’s execution time as a whole. This paper develops a power aware task clustering algorithm for parallel task scheduling Simulation results justify the design and implementation of proposed energy aware scheduling heuristics in the paper.","PeriodicalId":365914,"journal":{"name":"2010 IEEE 16th International Conference on Parallel and Distributed Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126169693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2010 IEEE 16th International Conference on Parallel and Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1