首页 > 最新文献

2009 29th IEEE International Conference on Distributed Computing Systems最新文献

英文 中文
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases 面向敏感分布式数据库高效查询执行的碎片化设计
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.52
V. Ciriani, S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati
The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that sensitive information is properly protected; on the other side, the impact of protection on the workload must be limited as query efficiency and system performance remain a primary requirement. We address this privacy/efficiency balance proposing an approach that, starting from a flexible definition of confidentiality constraints on a relational schema, applies encryption on information in a parsimonious way and mostly relies on fragmentation to protect sensitive associations among attributes. Fragmentation is guided by workload considerations so to minimize the cost of executing queries over fragments. We discuss the minimization problem when fragmenting data and provide a heuristic approach to its solution.
隐私和实用之间的平衡是一个经典问题,对现代信息系统的设计影响越来越大。一方面,确保敏感信息得到适当保护至关重要;另一方面,必须限制保护对工作负载的影响,因为查询效率和系统性能仍然是主要需求。我们提出了一种解决隐私/效率平衡的方法,该方法从对关系模式的机密性约束的灵活定义开始,以一种简洁的方式对信息应用加密,并主要依赖碎片来保护属性之间的敏感关联。碎片是根据工作负载考虑的,以便最小化在碎片上执行查询的成本。我们讨论了数据分割时的最小化问题,并提供了一种启发式方法来解决这个问题。
{"title":"Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases","authors":"V. Ciriani, S. Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati","doi":"10.1109/ICDCS.2009.52","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.52","url":null,"abstract":"The balance between privacy and utility is a classical problem with an increasing impact on the design of modern information systems. On the one side it is crucial to ensure that sensitive information is properly protected; on the other side, the impact of protection on the workload must be limited as query efficiency and system performance remain a primary requirement. We address this privacy/efficiency balance proposing an approach that, starting from a flexible definition of confidentiality constraints on a relational schema, applies encryption on information in a parsimonious way and mostly relies on fragmentation to protect sensitive associations among attributes. Fragmentation is guided by workload considerations so to minimize the cost of executing queries over fragments. We discuss the minimization problem when fragmenting data and provide a heuristic approach to its solution.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"382 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Collaboration-Oriented Data Recovery for Mobile Disk Arrays 面向协作的移动磁盘阵列数据恢复
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.13
T. Xie, Abhinav Sharma
Mobile disk arrays, disk arrays located in mobile data centers, are crucial for mobile applications such as disaster recovery. Due to their unusual application domains, mobile disk arrays face several new challenges including harsh operating environments, very limited power supply, and extremely small number of spare disks. Consequently, data reconstruction schemes for mobile disk arrays must be performance-driven, reliability-aware, and energy-efficient. In this paper, we develop a flash assisted data reconstruction strategy called CORE (collaboration-oriented reconstruction) on top of a hybrid disk array architecture, where hard disks and flash disks collaborate to shorten data reconstruction time, alleviate performance degradation during disk recovery. Experimental results demonstrate that CORE noticeably improves the performance and energy-efficiency over existing schemes.
移动磁盘阵列,即位于移动数据中心的磁盘阵列,对于诸如灾难恢复之类的移动应用程序至关重要。由于其不同寻常的应用领域,移动磁盘阵列面临着一些新的挑战,包括恶劣的操作环境、非常有限的电源和极少量的备用磁盘。因此,移动磁盘阵列的数据重构方案必须是性能驱动的、可靠的和节能的。在本文中,我们在混合磁盘阵列架构之上开发了一种称为CORE(协作导向重建)的闪存辅助数据重建策略,其中硬盘和闪存磁盘协作以缩短数据重建时间,减轻磁盘恢复期间的性能下降。实验结果表明,与现有方案相比,CORE方案显著提高了性能和能效。
{"title":"Collaboration-Oriented Data Recovery for Mobile Disk Arrays","authors":"T. Xie, Abhinav Sharma","doi":"10.1109/ICDCS.2009.13","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.13","url":null,"abstract":"Mobile disk arrays, disk arrays located in mobile data centers, are crucial for mobile applications such as disaster recovery. Due to their unusual application domains, mobile disk arrays face several new challenges including harsh operating environments, very limited power supply, and extremely small number of spare disks. Consequently, data reconstruction schemes for mobile disk arrays must be performance-driven, reliability-aware, and energy-efficient. In this paper, we develop a flash assisted data reconstruction strategy called CORE (collaboration-oriented reconstruction) on top of a hybrid disk array architecture, where hard disks and flash disks collaborate to shorten data reconstruction time, alleviate performance degradation during disk recovery. Experimental results demonstrate that CORE noticeably improves the performance and energy-efficiency over existing schemes.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126838947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Case for Spam-Aware High Performance Mail Server Architecture 可识别垃圾邮件的高性能邮件服务器体系结构的案例
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.74
Abhinav Pathak, Syed Ali, Raza Jafri, Y. C. Hu
The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The steep rise in the amount of unsolicited emails, i.e. spam, in the past decade, however, has permanently disrupted this tranquility of largely steady email volume and turned mail server performance into an increasingly important issue. In this paper, we point out that modern mail servers were not originally designed with email spam in mind, and as such, as the "common case'' workload for mail servers has shifted from legitimate emails to spam emails, we argue it is time to revisit mail server architecture design in following the system design principle of optimizing the common case. In particular, we show how to optimize the performance of three major components of modern mail servers, the concurrency architecture, the disk I/O, and DNSBL lookups, by exploiting the new "common case" workload. An evaluation of our prototype implementation of the enhanced postfix architecture shows that the optimizations significantly reduce the CPU, disk, and network resource consumptions, and improves the throughput of the mail server by 18% under a university departmental mail server workload and by 40% under a spam sinkhole workload.
在过去的几十年里,每个邮箱的电子邮件数量基本上保持在很低的水平,并且没有变化,因此邮件服务器的性能在很大程度上仍然是次要问题。然而,在过去十年中,未经请求的电子邮件(即垃圾邮件)数量的急剧增加,永久性地破坏了电子邮件数量基本稳定的宁静,并使邮件服务器性能成为一个日益重要的问题。在本文中,我们指出现代邮件服务器最初设计时并没有考虑到垃圾邮件,因此,随着邮件服务器的“常见情况”工作负载从合法电子邮件转移到垃圾邮件,我们认为是时候按照优化常见情况的系统设计原则重新审视邮件服务器架构设计了。特别是,我们将展示如何通过利用新的“常见情况”工作负载来优化现代邮件服务器的三个主要组件的性能:并发架构、磁盘I/O和DNSBL查找。对我们的增强后缀架构原型实现的评估表明,优化显著降低了CPU、磁盘和网络资源消耗,并在大学部门邮件服务器工作负载下将邮件服务器的吞吐量提高了18%,在垃圾邮件天坑工作负载下将邮件服务器的吞吐量提高了40%。
{"title":"The Case for Spam-Aware High Performance Mail Server Architecture","authors":"Abhinav Pathak, Syed Ali, Raza Jafri, Y. C. Hu","doi":"10.1109/ICDCS.2009.74","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.74","url":null,"abstract":"The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The steep rise in the amount of unsolicited emails, i.e. spam, in the past decade, however, has permanently disrupted this tranquility of largely steady email volume and turned mail server performance into an increasingly important issue. In this paper, we point out that modern mail servers were not originally designed with email spam in mind, and as such, as the \"common case'' workload for mail servers has shifted from legitimate emails to spam emails, we argue it is time to revisit mail server architecture design in following the system design principle of optimizing the common case. In particular, we show how to optimize the performance of three major components of modern mail servers, the concurrency architecture, the disk I/O, and DNSBL lookups, by exploiting the new \"common case\" workload. An evaluation of our prototype implementation of the enhanced postfix architecture shows that the optimizations significantly reduce the CPU, disk, and network resource consumptions, and improves the throughput of the mail server by 18% under a university departmental mail server workload and by 40% under a spam sinkhole workload.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134176510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On Optimal Concurrency Control for Optimistic Replication 乐观复制的最优并发控制
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.71
Weihan Wang, C. Amza
Concurrency control is a core component in optimistic replication systems. To detect concurrent updates, the system associates each replicated object with metadata, such as, version vectors or causal graphs exchanged on synchronization opportunities. However, the size of such metadata increases at least linearly with the number of active sites. With recent trends in cloud computing, multi-regional collaboration, and mobile networks, the number of sites within a single replication system becomes very large. This imposes substantial overhead in communication and computation on every site. In this paper, we first present three version vector implementations that significantly reduce the cost of vector exchange by incrementally transferring vector elements. Basic rotating vectors (BRV) support systems providing no conflict reconciliation, whereas conflict rotating vectors (CRV) extend BRV to overcome this limitation. Skip rotating vectors (SRV) based on CRV further reduce data transmission. We show that both BRV and SRV are optimal implementations of version vectors, which, in turn, have minimal storage complexity among all known concurrency control schemes for state-transfer systems. We then present a causal graph exchange algorithm for operation-transfer systems with optimal communication overhead. All these algorithms adopt network pipelining to reduce running time.
并发控制是乐观复制系统的核心组成部分。为了检测并发更新,系统将每个复制对象与元数据相关联,例如版本向量或在同步机会上交换的因果图。但是,此类元数据的大小至少与活动站点的数量呈线性增长。随着云计算、多区域协作和移动网络的最新趋势,单个复制系统中的站点数量变得非常大。这给每个站点带来了大量的通信和计算开销。在本文中,我们首先提出了三个版本向量实现,它们通过增量传输向量元素显著降低了向量交换的成本。基本旋转向量(BRV)支持系统不提供冲突调和,而冲突旋转向量(CRV)扩展了BRV以克服这一局限性。基于CRV的跳过旋转矢量(SRV)进一步减少了数据传输。我们证明了BRV和SRV都是版本向量的最佳实现,而版本向量在所有已知的状态转移系统并发控制方案中具有最小的存储复杂度。然后,我们提出了具有最优通信开销的操作转移系统的因果图交换算法。这些算法都采用了网络流水线,减少了运行时间。
{"title":"On Optimal Concurrency Control for Optimistic Replication","authors":"Weihan Wang, C. Amza","doi":"10.1109/ICDCS.2009.71","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.71","url":null,"abstract":"Concurrency control is a core component in optimistic replication systems. To detect concurrent updates, the system associates each replicated object with metadata, such as, version vectors or causal graphs exchanged on synchronization opportunities. However, the size of such metadata increases at least linearly with the number of active sites. With recent trends in cloud computing, multi-regional collaboration, and mobile networks, the number of sites within a single replication system becomes very large. This imposes substantial overhead in communication and computation on every site. In this paper, we first present three version vector implementations that significantly reduce the cost of vector exchange by incrementally transferring vector elements. Basic rotating vectors (BRV) support systems providing no conflict reconciliation, whereas conflict rotating vectors (CRV) extend BRV to overcome this limitation. Skip rotating vectors (SRV) based on CRV further reduce data transmission. We show that both BRV and SRV are optimal implementations of version vectors, which, in turn, have minimal storage complexity among all known concurrency control schemes for state-transfer systems. We then present a causal graph exchange algorithm for operation-transfer systems with optimal communication overhead. All these algorithms adopt network pipelining to reduce running time.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134628005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Sampling Based (epsilon, delta)-Approximate Aggregation Algorithm in Sensor Networks 传感器网络中基于采样的(epsilon, delta)-近似聚合算法
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.8
Siyao Cheng, Jianzhong Li
Aggregation operations are important for users to get summarization information in WSN applications. As large numbers of applications only require approximate aggregation results rather than the exact ones, some approximate aggregation algorithms are proposed to save energy. However, the error bounds of these algorithms are fixed and it is impossible to adjust their error bounds automatically. Therefore, these algorithms cannot reach arbitrary precision requirement given by user. This paper proposes a sampling based approximate aggregation algorithm to satisfy the requirement of arbitrary precision. Besides, two sample data adaptive algorithms are also provided. One is to adapt the sample with the varying of precision requirement. The other is to adapt the sample with the varying of the sensed data in networks. The theoretical analysis and experiment results show that the proposed algorithms have high performance in terms of accuracy and energy cost.
在WSN应用中,聚合操作对于用户获取摘要信息非常重要。由于大量应用只需要近似的聚合结果,而不需要精确的聚合结果,为了节省能量,提出了一些近似的聚合算法。然而,这些算法的误差范围是固定的,不可能自动调整它们的误差范围。因此,这些算法不能达到用户给出的任意精度要求。为了满足任意精度的要求,提出了一种基于采样的近似聚合算法。此外,还提供了两种样本数据自适应算法。一是根据精度要求的变化来适应样品。二是根据网络中传感数据的变化对样本进行自适应。理论分析和实验结果表明,该算法在精度和能量消耗方面具有较高的性能。
{"title":"Sampling Based (epsilon, delta)-Approximate Aggregation Algorithm in Sensor Networks","authors":"Siyao Cheng, Jianzhong Li","doi":"10.1109/ICDCS.2009.8","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.8","url":null,"abstract":"Aggregation operations are important for users to get summarization information in WSN applications. As large numbers of applications only require approximate aggregation results rather than the exact ones, some approximate aggregation algorithms are proposed to save energy. However, the error bounds of these algorithms are fixed and it is impossible to adjust their error bounds automatically. Therefore, these algorithms cannot reach arbitrary precision requirement given by user. This paper proposes a sampling based approximate aggregation algorithm to satisfy the requirement of arbitrary precision. Besides, two sample data adaptive algorithms are also provided. One is to adapt the sample with the varying of precision requirement. The other is to adapt the sample with the varying of the sensed data in networks. The theoretical analysis and experiment results show that the proposed algorithms have high performance in terms of accuracy and energy cost.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114479560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A Note on Distributed Stable Matching 关于分布式稳定匹配的一个注记
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.69
Alexander Kipnis, B. Patt-Shamir
We consider the distributed complexity of the stable marriage problem. In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable marriage problem requires Omega(sqrt(n/(B log n))) communication rounds in the worst case, even for graphs of diameter Theta (log n), where n is the number of nodes in the graph.  Furthermore, the lower bound holds even if we allow the output to contain O(sqrt(n)) blocking pairs. We also consider epsilon-stability, where a pair is called epsilon-blocking if they can improve the quality of their match by more than an epsilon fraction, for some 0
我们考虑稳定婚姻问题的分布复杂性。在这个问题中,通信图是无向的二部图,每个节点对其邻居进行排序。给定节点的匹配,如果一对节点更喜欢对方而不是分配给它们的匹配,则称为阻塞。如果匹配不产生任何阻塞对,则称为稳定匹配。在分布式模型中,节点在通信链路上每轮交换消息,直到找到稳定的匹配。我们表明,如果每个消息最多包含B位,那么在最坏的情况下,任何解决稳定婚姻问题的分布式算法都需要Omega(sqrt(n/(B log n))))轮通信,即使对于直径为Theta (log n)的图也是如此,其中n是图中的节点数。此外,即使我们允许输出包含O(sqrt(n))个阻塞对,下界仍然成立。我们还考虑了ε -稳定性,其中一对如果能够将匹配的质量提高超过ε分数,则称为ε -阻塞,对于某些0
{"title":"A Note on Distributed Stable Matching","authors":"Alexander Kipnis, B. Patt-Shamir","doi":"10.1109/ICDCS.2009.69","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.69","url":null,"abstract":"We consider the distributed complexity of the stable marriage problem. In this problem, the communication graph is undirected and bipartite, and each node ranks its neighbors. Given a matching of the nodes, a pair of nodes is called blocking if they prefer each other to their assigned match. A matching is called stable if it does not induce any blocking pair. In the distributed model, nodes exchange messages in each round over the communication links, until they find a stable matching. We show that if messages may contain at most B bits each, then any distributed algorithm that solves the stable marriage problem requires Omega(sqrt(n/(B log n))) communication rounds in the worst case, even for graphs of diameter Theta (log n), where n is the number of nodes in the graph.  Furthermore, the lower bound holds even if we allow the output to contain O(sqrt(n)) blocking pairs. We also consider epsilon-stability, where a pair is called epsilon-blocking if they can improve the quality of their match by more than an epsilon fraction, for some 0","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130472351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
TDMA-ASAP: Sensor Network TDMA Scheduling with Adaptive Slot-Stealing and Parallelism TDMA- asap:具有自适应偷槽和并行性的传感器网络TDMA调度
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.80
Sameh Gobriel, D. Mossé, Robert Cleric
TDMA has been proposed as a MAC protocol for wireless sensor networks (WSNs) due to its efficiency in high WSN load. However, TDMA is plagued with shortcomings; we present modifications to TDMA that will allow for the same efficiency of TDMA, while allowing the network to conserve energy during times of low load (when there is no activity being detected). Recognizing that aggregation plays an essential role in WSNs, TDMA-ASAP adds to TDMA: (a) transmission parallelism based on a level-by-level localized graph-coloring, (b) appropriate sleeping between transmissions ("napping"), (c) judicious and controlled TDMA slot stealing to avoid empty slots to be unused and (d) intelligent scheduling/ordering transmissions. Our results show that TDMA-ASAP's unique combination of TDMA, slot-stealing, napping, and message aggregation significantly outperforms other hybrid WSN MAC algorithms and has a performance that is close to optimal in terms of energy consumption and overall delay.
TDMA由于其在无线传感器网络高负载下的有效性而被提出作为无线传感器网络的MAC协议。然而,TDMA也有很多缺点;我们对TDMA进行了修改,使其具有与TDMA相同的效率,同时允许网络在低负载时(当没有检测到活动时)节省能量。认识到聚合在wsn中起着至关重要的作用,TDMA- asap为TDMA增加了:(a)基于逐级本地化图染色的传输并行性,(b)在传输之间适当的休眠(“小睡”),(c)明智和可控的TDMA插槽窃取以避免空闲插槽被使用,以及(d)智能调度/排序传输。我们的研究结果表明,TDMA- asap独特的TDMA、时隙窃取、休眠和消息聚合的组合显著优于其他混合WSN MAC算法,并且在能耗和总体延迟方面具有接近最佳的性能。
{"title":"TDMA-ASAP: Sensor Network TDMA Scheduling with Adaptive Slot-Stealing and Parallelism","authors":"Sameh Gobriel, D. Mossé, Robert Cleric","doi":"10.1109/ICDCS.2009.80","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.80","url":null,"abstract":"TDMA has been proposed as a MAC protocol for wireless sensor networks (WSNs) due to its efficiency in high WSN load. However, TDMA is plagued with shortcomings; we present modifications to TDMA that will allow for the same efficiency of TDMA, while allowing the network to conserve energy during times of low load (when there is no activity being detected). Recognizing that aggregation plays an essential role in WSNs, TDMA-ASAP adds to TDMA: (a) transmission parallelism based on a level-by-level localized graph-coloring, (b) appropriate sleeping between transmissions (\"napping\"), (c) judicious and controlled TDMA slot stealing to avoid empty slots to be unused and (d) intelligent scheduling/ordering transmissions. Our results show that TDMA-ASAP's unique combination of TDMA, slot-stealing, napping, and message aggregation significantly outperforms other hybrid WSN MAC algorithms and has a performance that is close to optimal in terms of energy consumption and overall delay.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124140613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Implementing a Register in a Dynamic Distributed System 动态分布式系统中寄存器的实现
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.46
R. Baldoni, Silvia Bonomi, Anne-Marie Kermarrec, M. Raynal
Providing distributed processes with concurrent objects is a fundamental service that has to be offered by any distributed system. The classical shared read/write register is one of the most basic ones. Several protocols have been proposed that build an atomic register on top of an asyn- chronous message-passing system prone to process crashes. In the same spirit, this paper addresses the implementation of a regular register (a weakened form of an atomic register) in an asynchronous dynamic message-passing system. The aim is here to cope with the net effect of the adversaries that are asynchrony and dynamicity (the fact that processes can enter and leave the system). The paper focuses on the class of dynamic systems the churn rate c of which is constant. It presents two protocols, one applicable to synchronous dynamic message passing systems, the other one to even- tually synchronous dynamic systems. Both protocols rely on an appropriate broadcast communication service (similar to a reliable broadcast). Each requires a specific constraint on the churn rate c. Both protocols are first presented in an as intuitive as possible way, and are then proved correct.
为分布式进程提供并发对象是任何分布式系统都必须提供的基本服务。经典的共享读/写寄存器是最基本的寄存器之一。已经提出了几个协议,在易于进程崩溃的异步消息传递系统之上构建原子寄存器。本着同样的精神,本文讨论了异步动态消息传递系统中常规寄存器(原子寄存器的弱化形式)的实现。这里的目标是处理异步和动态性(进程可以进入和离开系统的事实)的对手的净影响。研究一类流失率c为常数的动态系统。提出了两种协议,一种适用于同步动态消息传递系统,另一种适用于均匀同步动态消息传递系统。两种协议都依赖于适当的广播通信服务(类似于可靠的广播)。每个协议都需要对流失率c进行特定的约束。这两个协议首先以尽可能直观的方式呈现,然后被证明是正确的。
{"title":"Implementing a Register in a Dynamic Distributed System","authors":"R. Baldoni, Silvia Bonomi, Anne-Marie Kermarrec, M. Raynal","doi":"10.1109/ICDCS.2009.46","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.46","url":null,"abstract":"Providing distributed processes with concurrent objects is a fundamental service that has to be offered by any distributed system. The classical shared read/write register is one of the most basic ones. Several protocols have been proposed that build an atomic register on top of an asyn- chronous message-passing system prone to process crashes. In the same spirit, this paper addresses the implementation of a regular register (a weakened form of an atomic register) in an asynchronous dynamic message-passing system. The aim is here to cope with the net effect of the adversaries that are asynchrony and dynamicity (the fact that processes can enter and leave the system). The paper focuses on the class of dynamic systems the churn rate c of which is constant. It presents two protocols, one applicable to synchronous dynamic message passing systems, the other one to even- tually synchronous dynamic systems. Both protocols rely on an appropriate broadcast communication service (similar to a reliable broadcast). Each requires a specific constraint on the churn rate c. Both protocols are first presented in an as intuitive as possible way, and are then proved correct.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Information Value-Driven Near Real-Time Decision Support Systems 信息价值驱动的近实时决策支持系统
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.17
Ying Yan, Wen-Syan Li, Jian Xu
In this paper, we focus on challenges of supporting a decision support system (DSS) based on a hybrid approach (i.e. a federation system with data placement) for agile business intelligence applications. A DSS needs to be designed to handle a workload of potentially complex queries for important decision-making processes. The response time requirement (and a realistic goal) for such a DSS is near real time. The users of a DSS care about not only the response time but also the time stamp of the business operation report since both of them introduce uncertainty and risks to business decision-making. In our proposed DSS, each report is assigned with a business value; denoting its importance to business decision-making. An Information Value (IV) is a business value of a report discounted by time to reflex the uncertainty and risks associated with the computational latency and synchronization latency. We propose a novel Information Value-driven Query Processing (IVQP) framework specific for near real time DSS applications. The framework enables dynamic query plan selection by taking into account of information value and adaptation for online-arrival ad hoc queries. The framework works with single query as well as a workload of queries. The experimental results based on synthetic data and TPC-H show the effectiveness of our approach in achieving optimal information values for the workloads.
在本文中,我们重点讨论了为敏捷商业智能应用程序支持基于混合方法(即具有数据放置的联邦系统)的决策支持系统(DSS)所面临的挑战。需要设计DSS来处理重要决策过程中潜在复杂查询的工作负载。这种DSS的响应时间要求(和现实目标)是接近实时的。决策支持系统的用户不仅关心响应时间,还关心业务操作报告的时间戳,因为它们都给业务决策带来了不确定性和风险。在我们建议的DSS中,每个报告都被分配了一个业务价值;表示其对商业决策的重要性。信息价值(IV)是按时间贴现的报告的业务价值,以反映与计算延迟和同步延迟相关的不确定性和风险。我们提出了一种新的信息价值驱动查询处理(IVQP)框架,专门用于近实时的决策支持系统应用。该框架通过考虑在线到达的特别查询的信息价值和适应性,支持动态查询计划选择。该框架可用于单个查询以及查询工作负载。基于合成数据和TPC-H的实验结果表明,我们的方法在实现工作负载的最佳信息值方面是有效的。
{"title":"Information Value-Driven Near Real-Time Decision Support Systems","authors":"Ying Yan, Wen-Syan Li, Jian Xu","doi":"10.1109/ICDCS.2009.17","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.17","url":null,"abstract":"In this paper, we focus on challenges of supporting a decision support system (DSS) based on a hybrid approach (i.e. a federation system with data placement) for agile business intelligence applications. A DSS needs to be designed to handle a workload of potentially complex queries for important decision-making processes. The response time requirement (and a realistic goal) for such a DSS is near real time. The users of a DSS care about not only the response time but also the time stamp of the business operation report since both of them introduce uncertainty and risks to business decision-making. In our proposed DSS, each report is assigned with a business value; denoting its importance to business decision-making. An Information Value (IV) is a business value of a report discounted by time to reflex the uncertainty and risks associated with the computational latency and synchronization latency. We propose a novel Information Value-driven Query Processing (IVQP) framework specific for near real time DSS applications. The framework enables dynamic query plan selection by taking into account of information value and adaptation for online-arrival ad hoc queries. The framework works with single query as well as a workload of queries. The experimental results based on synthetic data and TPC-H show the effectiveness of our approach in achieving optimal information values for the workloads.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131141580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Connected k-Coverage Problem in Heterogeneous Sensor Nets: The Curse of Randomness and Heterogeneity 异构传感器网络中的连通k-覆盖问题:随机性和异质性的诅咒
Pub Date : 2009-06-22 DOI: 10.1109/ICDCS.2009.67
H. Ammari, John Giudici
Coverage is an essential task in sensor deployment for the design of wireless sensor networks. While most existing studies on coverage consider homogeneous sensors, the deployment of heterogeneous sensors represents more accurately the network design for real-world applications. In this paper, we focus on the problem of connected k-coverage in heterogeneous wireless sensor networks. Precisely, we distinguish two deployment strategies, where heterogeneous sensors are either randomly or pseudo-randomly distributed in a field. While the first deployment approach considers a single layer of heterogeneous sensors, the second one proposes a multi-tier architecture of heterogeneous sensors to better address the problems introduced by pure randomness and heterogeneity.
在无线传感器网络设计中,覆盖是传感器部署中的一项重要任务。虽然大多数现有的覆盖研究都考虑了同构传感器,但异构传感器的部署更准确地代表了现实世界应用的网络设计。本文主要研究异构无线传感器网络中的连通k覆盖问题。准确地说,我们区分了两种部署策略,其中异构传感器是随机或伪随机分布在一个领域。虽然第一种部署方法考虑的是单层异构传感器,但第二种部署方法提出了异构传感器的多层架构,以更好地解决纯随机性和异构性带来的问题。
{"title":"On the Connected k-Coverage Problem in Heterogeneous Sensor Nets: The Curse of Randomness and Heterogeneity","authors":"H. Ammari, John Giudici","doi":"10.1109/ICDCS.2009.67","DOIUrl":"https://doi.org/10.1109/ICDCS.2009.67","url":null,"abstract":"Coverage is an essential task in sensor deployment for the design of wireless sensor networks. While most existing studies on coverage consider homogeneous sensors, the deployment of heterogeneous sensors represents more accurately the network design for real-world applications. In this paper, we focus on the problem of connected k-coverage in heterogeneous wireless sensor networks. Precisely, we distinguish two deployment strategies, where heterogeneous sensors are either randomly or pseudo-randomly distributed in a field. While the first deployment approach considers a single layer of heterogeneous sensors, the second one proposes a multi-tier architecture of heterogeneous sensors to better address the problems introduced by pure randomness and heterogeneity.","PeriodicalId":387968,"journal":{"name":"2009 29th IEEE International Conference on Distributed Computing Systems","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134228632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
期刊
2009 29th IEEE International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1