首页 > 最新文献

2009 29th IEEE International Conference on Distributed Computing Systems最新文献

英文 中文
Autonomous Resource Selection for Decentralized Utility Computing 分布式效用计算的自主资源选择
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.70
Paolo Costa, Jeff Napper, G. Pierre, M. Steen
Many large-scale utility computing infrastructures comprise heterogeneous hardware and software resources. This raises the need for scalable resource selection services, which identify resources that match application requirements, and can potentially be assigned to these applications. We present a fully decentralized resource selection algorithm by which resources autonomously select themselves when their attributes match a query. An application specifies what it expects from a resource by means of a conjunction of (attribute, value-range) pairs, which are matched against the attribute values of resources. We show that our solution scales in the number of resources as well as in the number of attributes, while being relatively insensitive to churn and other membership changes such as node failures.
许多大型效用计算基础设施包含异构的硬件和软件资源。这增加了对可伸缩资源选择服务的需求,该服务识别与应用程序需求匹配的资源,并可能分配给这些应用程序。我们提出了一种完全分散的资源选择算法,当资源的属性与查询匹配时,资源可以自主选择自己。应用程序通过(属性、值-范围)对的结合来指定它期望从资源获得的内容,这些对与资源的属性值相匹配。我们表明,我们的解决方案在资源数量和属性数量上都是可扩展的,同时对用户流失和其他成员变更(如节点故障)相对不敏感。
{"title":"Autonomous Resource Selection for Decentralized Utility Computing","authors":"Paolo Costa, Jeff Napper, G. Pierre, M. Steen","doi":"10.1109/ICDCS.2009.70","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.70","url":null,"abstract":"Many large-scale utility computing infrastructures comprise heterogeneous hardware and software resources. This raises the need for scalable resource selection services, which identify resources that match application requirements, and can potentially be assigned to these applications. We present a fully decentralized resource selection algorithm by which resources autonomously select themselves when their attributes match a query. An application specifies what it expects from a resource by means of a conjunction of (attribute, value-range) pairs, which are matched against the attribute values of resources. We show that our solution scales in the number of resources as well as in the number of attributes, while being relatively insensitive to churn and other membership changes such as node failures.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126946375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Q-Tree: A Multi-Attribute Based Range Query Solution for Tele-immersive Framework Q-Tree:基于多属性的远程沉浸式框架范围查询解决方案
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.41
A. Arefin, Md Yusuf Sarwar Uddin, Indranil Gupta, K. Nahrstedt
Users and administrators of large distributed systems are frequently in need of monitoring and management of its various components, data items and resources. Though there exist several distributed query and aggregation systems, the clustered structure of tele-immersive interactive frameworks and their time-sensitive nature and application requirements represent a new class of systems which poses different challenges on this distributed search. Multi-attribute composite range queries are one of the key features in this class. Queries are given in high level descriptions and then transformed into multi-attribute composite range queries. Designing such a query engine with minimum traffic overhead, low service latency, and with static and dynamic nature of large datasets, is a challenging task. In this paper, we propose a general multi-attribute based range query framework, Q-Tree, that provides efficient support for this class of systems. In order to serve efficient queries, Q-Tree builds a single topology-aware tree overlay by connecting the participating nodes in a bottom-up approach, and assigns range intervals on each node in a hierarchical manner. We show the relative strength of Q-Tree by analytically comparing it against P-Tree, P-Ring, Skip-Graph and Chord. With fine-grained load balancing and overlay maintenance, our simulations with PlanetLab traces show that our approach can answer complex queries within a fraction of a second.
大型分布式系统的用户和管理员经常需要监视和管理其各种组件、数据项和资源。虽然目前已有几种分布式查询和聚合系统,但远程沉浸式交互框架的集群结构及其时间敏感性和应用需求代表了一类新的系统,这对分布式搜索提出了不同的挑战。多属性复合范围查询是该类的关键特性之一。查询以高级描述形式给出,然后转换为多属性复合范围查询。设计这样一个具有最小流量开销、低服务延迟以及大型数据集的静态和动态特性的查询引擎是一项具有挑战性的任务。在本文中,我们提出了一个通用的基于多属性的范围查询框架Q-Tree,为这类系统提供了有效的支持。为了提供高效的查询服务,Q-Tree以自底向上的方式连接参与节点,构建单个拓扑感知树覆盖,并以分层方式在每个节点上分配范围间隔。通过与P-Tree、P-Ring、Skip-Graph和Chord进行分析比较,证明了Q-Tree的相对强度。通过细粒度负载平衡和覆盖维护,我们使用PlanetLab跟踪进行的模拟表明,我们的方法可以在几分之一秒内回答复杂的查询。
{"title":"Q-Tree: A Multi-Attribute Based Range Query Solution for Tele-immersive Framework","authors":"A. Arefin, Md Yusuf Sarwar Uddin, Indranil Gupta, K. Nahrstedt","doi":"10.1109/ICDCS.2009.41","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.41","url":null,"abstract":"Users and administrators of large distributed systems are frequently in need of monitoring and management of its various components, data items and resources. Though there exist several distributed query and aggregation systems, the clustered structure of tele-immersive interactive frameworks and their time-sensitive nature and application requirements represent a new class of systems which poses different challenges on this distributed search. Multi-attribute composite range queries are one of the key features in this class. Queries are given in high level descriptions and then transformed into multi-attribute composite range queries. Designing such a query engine with minimum traffic overhead, low service latency, and with static and dynamic nature of large datasets, is a challenging task. In this paper, we propose a general multi-attribute based range query framework, Q-Tree, that provides efficient support for this class of systems. In order to serve efficient queries, Q-Tree builds a single topology-aware tree overlay by connecting the participating nodes in a bottom-up approach, and assigns range intervals on each node in a hierarchical manner. We show the relative strength of Q-Tree by analytically comparing it against P-Tree, P-Ring, Skip-Graph and Chord. With fine-grained load balancing and overlay maintenance, our simulations with PlanetLab traces show that our approach can answer complex queries within a fraction of a second.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122381364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Minimizing Latency in Fault-Tolerant Distributed Stream Processing Systems 在容错分布式流处理系统中最小化延迟
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.35
Andrey Brito, C. Fetzer, P. Felber
Event stream processing (ESP) applications target the real-time processing of huge amounts of data. Events traverse a graph of stream processing operators where the information of interest is extracted. As these applications gain popularity, the requirements for scalability, availability, and dependability increase. In terms of dependability and availability, many applications require a precise recovery, i.e., a guarantee that the outputs during and after a recovery would be the same as if the failure that triggered recovery had never occurred. Existing solutions for precise recovery induce prohibitive latency costs, either by requiring continuous checkpoint or logging (in a passive replication approach) or perfect synchronization between replicas executing the same operations (in an active replication approach). We introduce a novel technique to guarantee precise recovery for ESP applications while minimizing the latency costs as compared to traditional approaches. The technique minimizes latencies via speculative execution in a distributed system. In terms of scalability, the key component of our approach is a modified software transactional memory that provides not only the speculation capabilities but also optimistic parallelization for costly operations.
事件流处理(ESP)应用程序的目标是实时处理大量数据。事件遍历流处理操作符的图,从中提取感兴趣的信息。随着这些应用程序的普及,对可伸缩性、可用性和可靠性的需求也在增加。就可靠性和可用性而言,许多应用程序需要精确的恢复,即保证在恢复期间和之后的输出与触发恢复的故障从未发生过一样。现有的精确恢复解决方案要么需要连续的检查点或日志记录(在被动复制方法中),要么需要执行相同操作的副本之间的完美同步(在主动复制方法中),从而导致了过高的延迟成本。与传统方法相比,我们引入了一种新技术,可以保证ESP应用的精确恢复,同时最大限度地降低延迟成本。该技术通过在分布式系统中推测执行来最小化延迟。在可伸缩性方面,我们的方法的关键组件是修改后的软件事务性内存,它不仅提供推测能力,而且为昂贵的操作提供乐观并行化。
{"title":"Minimizing Latency in Fault-Tolerant Distributed Stream Processing Systems","authors":"Andrey Brito, C. Fetzer, P. Felber","doi":"10.1109/ICDCS.2009.35","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.35","url":null,"abstract":"Event stream processing (ESP) applications target the real-time processing of huge amounts of data. Events traverse a graph of stream processing operators where the information of interest is extracted. As these applications gain popularity, the requirements for scalability, availability, and dependability increase. In terms of dependability and availability, many applications require a precise recovery, i.e., a guarantee that the outputs during and after a recovery would be the same as if the failure that triggered recovery had never occurred. Existing solutions for precise recovery induce prohibitive latency costs, either by requiring continuous checkpoint or logging (in a passive replication approach) or perfect synchronization between replicas executing the same operations (in an active replication approach). We introduce a novel technique to guarantee precise recovery for ESP applications while minimizing the latency costs as compared to traditional approaches. The technique minimizes latencies via speculative execution in a distributed system. In terms of scalability, the key component of our approach is a modified software transactional memory that provides not only the speculation capabilities but also optimistic parallelization for costly operations.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121522724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Explicit Batching for Distributed Objects 分布式对象的显式批处理
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.39
E. Tilevich, W. Cook, Yang Jiao
Although distributed object systems, including RMI and CORBA, enable object-oriented programs to be easily dis- tributed across a network, achieving acceptable performance usually requires client-specific optimization of server inter- faces, making such systems difficult to maintain and evolve. Automatic optimization techniques, including Batched Fu- tures and Communication Restructuring, do not work as well as hand optimization. This paper presents Batched Remote Method Invocation (BRMI), a language-level technique for clients to specify explicit batches of operations on remote objects. We have implemented BRMI for Java as an extension of RMI, with support for batches with array cursors, custom exception handling, conditionals and loops. BRMI allows common design patterns, including Data Transfer Objects and Remote Object Facade, to be constructed on the fly by clients. The performance benefits of batching operations are well known; our evaluation focuses on the usability of explicit batches, but we also confirm that BRMI outperforms RMI and scales significantly better when clients make multi- ple remote calls. The applicability of BRMI is demonstrated by rewriting third-party RMI client applications to use BRMI.
尽管分布式对象系统,包括RMI和CORBA,使面向对象的程序能够很容易地分布在网络上,但要实现可接受的性能通常需要对服务器接口进行特定于客户端的优化,这使得这样的系统难以维护和发展。自动优化技术,包括批处理赋值和通信重构,不如手动优化工作得好。本文提出了批处理远程方法调用(BRMI),这是一种语言级技术,用于客户端明确指定远程对象上的批处理操作。我们已经为Java实现了BRMI,作为RMI的扩展,支持数组游标的批量处理、自定义异常处理、条件和循环。BRMI允许客户端动态地构建常见的设计模式,包括数据传输对象和远程对象Facade。批处理操作的性能优势是众所周知的;我们的评估侧重于显式批处理的可用性,但我们也确认,当客户端进行多个远程调用时,BRMI优于RMI,并且可扩展性明显更好。通过重写第三方RMI客户端应用程序以使用BRMI来证明BRMI的适用性。
{"title":"Explicit Batching for Distributed Objects","authors":"E. Tilevich, W. Cook, Yang Jiao","doi":"10.1109/ICDCS.2009.39","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.39","url":null,"abstract":"Although distributed object systems, including RMI and CORBA, enable object-oriented programs to be easily dis- tributed across a network, achieving acceptable performance usually requires client-specific optimization of server inter- faces, making such systems difficult to maintain and evolve. Automatic optimization techniques, including Batched Fu- tures and Communication Restructuring, do not work as well as hand optimization. This paper presents Batched Remote Method Invocation (BRMI), a language-level technique for clients to specify explicit batches of operations on remote objects. We have implemented BRMI for Java as an extension of RMI, with support for batches with array cursors, custom exception handling, conditionals and loops. BRMI allows common design patterns, including Data Transfer Objects and Remote Object Facade, to be constructed on the fly by clients. The performance benefits of batching operations are well known; our evaluation focuses on the usability of explicit batches, but we also confirm that BRMI outperforms RMI and scales significantly better when clients make multi- ple remote calls. The applicability of BRMI is demonstrated by rewriting third-party RMI client applications to use BRMI.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Better Architectures and New Security Applications for Network Monitoring 网络监控的更好的架构和新的安全应用
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.85
M. Reiter
Busy networks today cannot afford to log all traffic traversing them, and consequently many network-monitoring applications make due with coarse traffic summaries. In this talk we will describe an approach we have developed to improve the fidelity of these traffic summaries, by coordinating the monitoring performed by the network's routers so as to achieve network-wide monitoring goals while respecting each router's processing constraints. We will also describe our use of traffic summaries to detect a variety of stealthy network abuses—e.g., file-sharing traffic masquerading on other application ports, "hit-list" scans and malware propagation, data exfiltration by spyware, and botnet command-and-control traffic—and even to identify the origin of epidemic malware spreads.
当今繁忙的网络无法记录所有流经它们的流量,因此许多网络监控应用程序只能使用粗略的流量摘要。在这次演讲中,我们将描述我们开发的一种方法,通过协调网络路由器执行的监控来提高这些流量摘要的保真度,从而在尊重每个路由器的处理约束的同时实现全网范围的监控目标。我们还将描述我们使用流量摘要来检测各种隐蔽的网络滥用-例如。例如,伪装在其他应用程序端口上的文件共享流量,“命中列表”扫描和恶意软件传播,间谍软件的数据泄露以及僵尸网络命令和控制流量,甚至可以识别流行恶意软件传播的来源。
{"title":"Better Architectures and New Security Applications for Network Monitoring","authors":"M. Reiter","doi":"10.1109/ICDCS.2009.85","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.85","url":null,"abstract":"Busy networks today cannot afford to log all traffic traversing them, and consequently many network-monitoring applications make due with coarse traffic summaries. In this talk we will describe an approach we have developed to improve the fidelity of these traffic summaries, by coordinating the monitoring performed by the network's routers so as to achieve network-wide monitoring goals while respecting each router's processing constraints. We will also describe our use of traffic summaries to detect a variety of stealthy network abuses—e.g., file-sharing traffic masquerading on other application ports, \"hit-list\" scans and malware propagation, data exfiltration by spyware, and botnet command-and-control traffic—and even to identify the origin of epidemic malware spreads.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Roadcast: A Popularity Aware Content Sharing Scheme in VANETs 广播:VANETs中具有流行意识的内容共享方案
Pub Date : 2009-06-22 DOI: 10.1145/1740437.1740439
Yang Zhang, J. Zhao, G. Cao
Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration and unreliable wireless connection, a vehicle can get the useful data only when it meets another vehicle and the encountered vehicle has the exactly matched data. However, the probability of such case is very low. To improve the performance of content sharing in intermittently connected VANETs, we propose a novel P2P content sharing scheme called Roadcast. Roadcast ensures popular data is more likely to be shared with other vehicles so that the overall query delay and the query hit ratio can be improved. Roadcast consists of two components called popularity aware content retrieval and popularity aware data replacement. The popularity aware content retrieval scheme makes use of Information Retrieval (IR) techniques to find the most relevant and popular data towards user's query. The popularity aware data replacement algorithm ensures that the density of different data is proportional to their popularity in the system steady state, which firmly obeys the optimal "square-root" replication rule. Results based on real city map and real traffic model show that Roadcast outperforms other content sharing schemes in VANETs.
通过车对车通信的内容共享,可以帮助人们在路上找到自己感兴趣的内容。在VANETs中,由于接触时间有限和无线连接不可靠,车辆只有在遇到另一辆车并且遇到的车辆具有完全匹配的数据时才能获得有用的数据。然而,这种情况的概率是非常低的。为了提高间断连接vanet的内容共享性能,我们提出了一种新的P2P内容共享方案——Roadcast。Roadcast确保流行数据更有可能与其他车辆共享,从而提高总体查询延迟和查询命中率。Roadcast由流行感知内容检索和流行感知数据替换两部分组成。流行度感知内容检索方案利用信息检索(Information retrieval, IR)技术,针对用户的查询,找到最相关、最流行的数据。流行度感知数据替换算法保证了系统稳态下不同数据的密度与流行度成正比,牢固地遵循最优“平方根”复制规则。基于真实城市地图和真实交通模型的结果表明,在VANETs中,Roadcast优于其他内容共享方案。
{"title":"Roadcast: A Popularity Aware Content Sharing Scheme in VANETs","authors":"Yang Zhang, J. Zhao, G. Cao","doi":"10.1145/1740437.1740439","DOIUrl":"https://doi.org/10.1145/1740437.1740439","url":null,"abstract":"Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration and unreliable wireless connection, a vehicle can get the useful data only when it meets another vehicle and the encountered vehicle has the exactly matched data. However, the probability of such case is very low. To improve the performance of content sharing in intermittently connected VANETs, we propose a novel P2P content sharing scheme called Roadcast. Roadcast ensures popular data is more likely to be shared with other vehicles so that the overall query delay and the query hit ratio can be improved. Roadcast consists of two components called popularity aware content retrieval and popularity aware data replacement. The popularity aware content retrieval scheme makes use of Information Retrieval (IR) techniques to find the most relevant and popular data towards user's query. The popularity aware data replacement algorithm ensures that the density of different data is proportional to their popularity in the system steady state, which firmly obeys the optimal \"square-root\" replication rule. Results based on real city map and real traffic model show that Roadcast outperforms other content sharing schemes in VANETs.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121991786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 140
Collaboration-Oriented Data Recovery for Mobile Disk Arrays 面向协作的移动磁盘阵列数据恢复
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.13
T. Xie, Abhinav Sharma
Mobile disk arrays, disk arrays located in mobile data centers, are crucial for mobile applications such as disaster recovery. Due to their unusual application domains, mobile disk arrays face several new challenges including harsh operating environments, very limited power supply, and extremely small number of spare disks. Consequently, data reconstruction schemes for mobile disk arrays must be performance-driven, reliability-aware, and energy-efficient. In this paper, we develop a flash assisted data reconstruction strategy called CORE (collaboration-oriented reconstruction) on top of a hybrid disk array architecture, where hard disks and flash disks collaborate to shorten data reconstruction time, alleviate performance degradation during disk recovery. Experimental results demonstrate that CORE noticeably improves the performance and energy-efficiency over existing schemes.
移动磁盘阵列,即位于移动数据中心的磁盘阵列,对于诸如灾难恢复之类的移动应用程序至关重要。由于其不同寻常的应用领域,移动磁盘阵列面临着一些新的挑战,包括恶劣的操作环境、非常有限的电源和极少量的备用磁盘。因此,移动磁盘阵列的数据重构方案必须是性能驱动的、可靠的和节能的。在本文中,我们在混合磁盘阵列架构之上开发了一种称为CORE(协作导向重建)的闪存辅助数据重建策略,其中硬盘和闪存磁盘协作以缩短数据重建时间,减轻磁盘恢复期间的性能下降。实验结果表明,与现有方案相比,CORE方案显著提高了性能和能效。
{"title":"Collaboration-Oriented Data Recovery for Mobile Disk Arrays","authors":"T. Xie, Abhinav Sharma","doi":"10.1109/ICDCS.2009.13","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.13","url":null,"abstract":"Mobile disk arrays, disk arrays located in mobile data centers, are crucial for mobile applications such as disaster recovery. Due to their unusual application domains, mobile disk arrays face several new challenges including harsh operating environments, very limited power supply, and extremely small number of spare disks. Consequently, data reconstruction schemes for mobile disk arrays must be performance-driven, reliability-aware, and energy-efficient. In this paper, we develop a flash assisted data reconstruction strategy called CORE (collaboration-oriented reconstruction) on top of a hybrid disk array architecture, where hard disks and flash disks collaborate to shorten data reconstruction time, alleviate performance degradation during disk recovery. Experimental results demonstrate that CORE noticeably improves the performance and energy-efficiency over existing schemes.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases 面向敏感分布式数据库高效查询执行的碎片化设计
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.52
V. Ciriani, S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati
The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that sensitive information is properly protected; on the other side, the impact of protection on the workload must be limited as query efficiency and system performance remain a primary requirement. We address this privacy/efficiency balance proposing an approach that, starting from a flexible definition of confidentiality constraints on a relational schema, applies encryption on information in a parsimonious way and mostly relies on fragmentation to protect sensitive associations among attributes. Fragmentation is guided by workload considerations so to minimize the cost of executing queries over fragments. We discuss the minimization problem when fragmenting data and provide a heuristic approach to its solution.
隐私和实用之间的平衡是一个经典问题,对现代信息系统的设计影响越来越大。一方面,确保敏感信息得到适当保护至关重要;另一方面,必须限制保护对工作负载的影响,因为查询效率和系统性能仍然是主要需求。我们提出了一种解决隐私/效率平衡的方法,该方法从对关系模式的机密性约束的灵活定义开始,以一种简洁的方式对信息应用加密,并主要依赖碎片来保护属性之间的敏感关联。碎片是根据工作负载考虑的,以便最小化在碎片上执行查询的成本。我们讨论了数据分割时的最小化问题,并提供了一种启发式方法来解决这个问题。
{"title":"Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases","authors":"V. Ciriani, S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati","doi":"10.1109/ICDCS.2009.52","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.52","url":null,"abstract":"The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that sensitive information is properly protected; on the other side, the impact of protection on the workload must be limited as query efficiency and system performance remain a primary requirement. We address this privacy/efficiency balance proposing an approach that, starting from a flexible definition of confidentiality constraints on a relational schema, applies encryption on information in a parsimonious way and mostly relies on fragmentation to protect sensitive associations among attributes. Fragmentation is guided by workload considerations so to minimize the cost of executing queries over fragments. We discuss the minimization problem when fragmenting data and provide a heuristic approach to its solution.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
PADD: Power Aware Domain Distribution PADD: Power - Aware Domain Distribution
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.47
M. Lim, F. Rawson, T. Bletsch, V. Freeh
Modern data centers usually have computing resources sized to handle expected peak demand, but average demand is generally much lower than peak. This means that the systems in the data center usually operate at very low utilization rates. Past techniques have exploited this fact to achieve significant power savings, but they generally focus on centrally managed, throughput-oriented systems that process a single fine-grained request stream. We propose a more general solution — a technique to save power by dynamically migrating virtual machines and packing them onto fewer physical machines when possible. We call our scheme Power-Aware Domain Distribution (PADD). In this paper, we report on simulation results for PADD and demonstrate that the power and performance changes from using PADD are primarily dependent on how much buffering or reserve capacity it maintains. Our adaptive buffering scheme achieves energy savings within 7% of the idealized system that has no performance penalty. Our results also show that we can achieve an energy savings up to 70% with fewer than 1% of the requests violating their service level agreements.
现代数据中心通常有计算资源来处理预期的峰值需求,但平均需求通常远低于峰值。这意味着数据中心中的系统通常以非常低的利用率运行。过去的技术已经利用这一事实实现了显著的节能,但它们通常侧重于集中管理的、面向吞吐量的系统,这些系统处理单个细粒度请求流。我们提出了一种更通用的解决方案——一种通过动态迁移虚拟机并尽可能将它们打包到更少的物理机上来节省电力的技术。我们称之为功率感知域分布(PADD)。在本文中,我们报告了PADD的仿真结果,并证明了使用PADD的功率和性能变化主要取决于它维护了多少缓冲或备用容量。我们的自适应缓冲方案在没有性能损失的情况下实现了理想系统7%的节能。我们的结果还表明,在不到1%的请求违反其服务水平协议的情况下,我们可以实现高达70%的能源节约。
{"title":"PADD: Power Aware Domain Distribution","authors":"M. Lim, F. Rawson, T. Bletsch, V. Freeh","doi":"10.1109/ICDCS.2009.47","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.47","url":null,"abstract":"Modern data centers usually have computing resources sized to handle expected peak demand, but average demand is generally much lower than peak. This means that the systems in the data center usually operate at very low utilization rates. Past techniques have exploited this fact to achieve significant power savings, but they generally focus on centrally managed, throughput-oriented systems that process a single fine-grained request stream. We propose a more general solution — a technique to save power by dynamically migrating virtual machines and packing them onto fewer physical machines when possible. We call our scheme Power-Aware Domain Distribution (PADD). In this paper, we report on simulation results for PADD and demonstrate that the power and performance changes from using PADD are primarily dependent on how much buffering or reserve capacity it maintains. Our adaptive buffering scheme achieves energy savings within 7% of the idealized system that has no performance penalty. Our results also show that we can achieve an energy savings up to 70% with fewer than 1% of the requests violating their service level agreements.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Simulation Framework and Performance Analysis of Multimedia Broadcasting Service over Wireless Networks 无线网络多媒体广播业务仿真框架及性能分析
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.49
W. J. Jeon, Kyungtae Kang, R. Campbell, K. Nahrstedt
The recent development of high-speed data transmission over wireless networks enables multimedia broadcasting service to mobile users. Multimedia broadcasting service involves interactions among different system and network components, so it is crucial for the service provider to verify the correctness of system/service model and design, and their behaviors before a new type of service is deployed. However, due to limitations of using network simulations or scaled experimental testbeds, there has been none of research on such verification and simulation framework in 3G broadcasting networks. Therefore, we propose a simulation and analysis framework for multimedia broadcasting service over wireless networks. With concrete modeling of wireless physical channel, network, and data processing on a client device, it enables the prediction of various interesting system parameters and perceived quality of multimedia streams to users. Different models of system and network components can be plugged easily in our simulation framework for further extensions. Using this framework, we analyze the processing performance for decoding scalable videos on mobile devices in CDMA2000 wireless networks.
无线网络高速数据传输的最新发展使多媒体广播服务能够向移动用户提供。多媒体广播业务涉及到不同系统和网络组件之间的交互,因此在部署一种新的业务类型之前,验证系统/服务模型和设计及其行为的正确性是至关重要的。然而,由于使用网络仿真或规模化实验测试平台的限制,目前还没有在3G广播网络中对这种验证和仿真框架进行研究。因此,我们提出了一个无线网络多媒体广播业务的仿真分析框架。通过对客户端设备上的无线物理通道、网络和数据处理进行具体建模,它可以预测各种有趣的系统参数和对用户的多媒体流的感知质量。系统和网络组件的不同模型可以很容易地插入到我们的仿真框架中进行进一步扩展。利用该框架,我们分析了CDMA2000无线网络中移动设备上可扩展视频解码的处理性能。
{"title":"Simulation Framework and Performance Analysis of Multimedia Broadcasting Service over Wireless Networks","authors":"W. J. Jeon, Kyungtae Kang, R. Campbell, K. Nahrstedt","doi":"10.1109/ICDCS.2009.49","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.49","url":null,"abstract":"The recent development of high-speed data transmission over wireless networks enables multimedia broadcasting service to mobile users. Multimedia broadcasting service involves interactions among different system and network components, so it is crucial for the service provider to verify the correctness of system/service model and design, and their behaviors before a new type of service is deployed. However, due to limitations of using network simulations or scaled experimental testbeds, there has been none of research on such verification and simulation framework in 3G broadcasting networks. Therefore, we propose a simulation and analysis framework for multimedia broadcasting service over wireless networks. With concrete modeling of wireless physical channel, network, and data processing on a client device, it enables the prediction of various interesting system parameters and perceived quality of multimedia streams to users. Different models of system and network components can be plugged easily in our simulation framework for further extensions. Using this framework, we analyze the processing performance for decoding scalable videos on mobile devices in CDMA2000 wireless networks.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128444685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 29th IEEE International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1