首页 > 最新文献

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

英文 中文
SER Analysis of 8x8 QOSTC with Less Decoding Complexity 低解码复杂度的8x8 QOSTC的SER分析
M. Hanif, M. Lee
In this paper, we separate the symbols in the layered basis and then find the equivalent channel matrix. Based on the equivalent channel matrix we provide the grouping scheme. In our paper, we construct a block wise transmission technique which will achieve the desired code rate and reduce the decoding complexity.
在本文中,我们在分层基中分离符号,然后找到等效的信道矩阵。在等效信道矩阵的基础上,给出了分组方案。在本文中,我们构造了一种能达到预期码率和降低译码复杂度的分组传输技术。
{"title":"SER Analysis of 8x8 QOSTC with Less Decoding Complexity","authors":"M. Hanif, M. Lee","doi":"10.1109/CyberC.2012.90","DOIUrl":"https://doi.org/10.1109/CyberC.2012.90","url":null,"abstract":"In this paper, we separate the symbols in the layered basis and then find the equivalent channel matrix. Based on the equivalent channel matrix we provide the grouping scheme. In our paper, we construct a block wise transmission technique which will achieve the desired code rate and reduce the decoding complexity.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126644098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver 接收端行为不端的微传输协议安全性分析
Florian Adamsky, S. A. Khayam, Rudolf Jäger, M. Rajarajan
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives correct feedback, since otherwise this deteriorates throughput or yields to corrupted data. We show through experimental investigation that a misbehaving uTP receiver, which is not interested in data integrity, can increase the bandwidth of the sender by up to five times. This can cause a congestion collapse and steal large share of a victim's bandwidth. We present three attacks, which increase the bandwidth usage significantly. We have tested these attacks in a real world environment and show its severity both in terms of number of packets and total traffic generated. We also present a countermeasure for protecting against the attacks and evaluate the performance of that defence strategy.
BitTorrent是使用最广泛的点对点(P2P)协议,它占欧洲流量的最大份额。为了使BitTorrent对互联网服务提供商(ISP)更加友好,BitTorrent公司发明了微传输协议(uTP)。它基于UDP,具有一种称为低额外延迟背景传输(LEDBAT)的新颖拥塞控制。该协议假定接收方总是给出正确的反馈,否则会降低吞吐量或产生损坏的数据。我们通过实验研究表明,一个对数据完整性不感兴趣的行为不端的uTP接收方可以将发送方的带宽增加多达五倍。这可能会导致拥塞崩溃,并窃取受害者的大部分带宽。我们提出了三种显著增加带宽使用的攻击。我们已经在真实环境中测试了这些攻击,并从生成的数据包数量和总流量两方面显示了其严重性。我们还提出了防御攻击的对策,并评估了该防御策略的性能。
{"title":"Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver","authors":"Florian Adamsky, S. A. Khayam, Rudolf Jäger, M. Rajarajan","doi":"10.1109/CyberC.2012.31","DOIUrl":"https://doi.org/10.1109/CyberC.2012.31","url":null,"abstract":"BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives correct feedback, since otherwise this deteriorates throughput or yields to corrupted data. We show through experimental investigation that a misbehaving uTP receiver, which is not interested in data integrity, can increase the bandwidth of the sender by up to five times. This can cause a congestion collapse and steal large share of a victim's bandwidth. We present three attacks, which increase the bandwidth usage significantly. We have tested these attacks in a real world environment and show its severity both in terms of number of packets and total traffic generated. We also present a countermeasure for protecting against the attacks and evaluate the performance of that defence strategy.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation 独立于元数据的媒体识别哈希P2P传输优化
J. Warren, Michael Clear, C. McGoldrick
Efficient swarming behaviours within peer-to-peer networks are hindered by imprecise or incorrect metadata content. Once published, metadata corrections can only be effected by a complete republish/swarm recreation or for each peer to manually make corrections (causing them to leave the swarm, decreasing performance). This work presents an approach which enables a swarm to collaboratively upgrade embedded data to reflect changes in metadata, and to identify additional candidates which contain differing metadata but a correct payload. Swarm degradation due to peer drop-off resulting from edits is eliminated, and additional peers can be identified in a fully automated fashion, increasing swarm lifetime and performance. Arising from this metadata abstraction, automatic purification can be realised in situations where multiple incomplete/incorrect versions are available within one or more unconnected swarms. Variations associated with a content set are processed associatively using a knowledge discovery rule set to extrapolate a canonical tag set, which can also be reinforced using data from external corpora. After any update, these changes can again be automatically disseminated in a peer-to-peer swarm. The system presented enables context-aware P2P data transfers which abstract metadata optimally, while also maximising swarm size and enabling cataloguing of content. A proof-of-concept implementation is presented, and its impact on swarm purification/ optimisation is evaluated.
点对点网络中有效的蜂群行为受到不精确或不正确的元数据内容的阻碍。一旦发布,元数据更正只能通过完全重新发布/重新创建群或每个对等点手动进行更正来实现(导致它们离开群,从而降低性能)。这项工作提出了一种方法,使集群能够协作升级嵌入式数据以反映元数据的变化,并识别包含不同元数据但正确有效负载的其他候选数据。由于编辑导致的对等体下降导致的群体退化被消除,并且可以以完全自动化的方式识别额外的对等体,增加群体的生命周期和性能。由于这种元数据抽象,在一个或多个未连接的集群中存在多个不完整/不正确版本的情况下,可以实现自动净化。使用知识发现规则集来关联地处理与内容集相关的变量,以推断出规范标记集,也可以使用来自外部语料库的数据来加强规范化标记集。在任何更新之后,这些更改都可以再次在对等群中自动传播。所提出的系统使上下文感知的P2P数据传输能够最优地抽象元数据,同时也最大限度地扩大群大小并实现内容编目。提出了一个概念验证实现,并评估了其对群体净化/优化的影响。
{"title":"Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation","authors":"J. Warren, Michael Clear, C. McGoldrick","doi":"10.1109/CyberC.2012.19","DOIUrl":"https://doi.org/10.1109/CyberC.2012.19","url":null,"abstract":"Efficient swarming behaviours within peer-to-peer networks are hindered by imprecise or incorrect metadata content. Once published, metadata corrections can only be effected by a complete republish/swarm recreation or for each peer to manually make corrections (causing them to leave the swarm, decreasing performance). This work presents an approach which enables a swarm to collaboratively upgrade embedded data to reflect changes in metadata, and to identify additional candidates which contain differing metadata but a correct payload. Swarm degradation due to peer drop-off resulting from edits is eliminated, and additional peers can be identified in a fully automated fashion, increasing swarm lifetime and performance. Arising from this metadata abstraction, automatic purification can be realised in situations where multiple incomplete/incorrect versions are available within one or more unconnected swarms. Variations associated with a content set are processed associatively using a knowledge discovery rule set to extrapolate a canonical tag set, which can also be reinforced using data from external corpora. After any update, these changes can again be automatically disseminated in a peer-to-peer swarm. The system presented enables context-aware P2P data transfers which abstract metadata optimally, while also maximising swarm size and enabling cataloguing of content. A proof-of-concept implementation is presented, and its impact on swarm purification/ optimisation is evaluated.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mobility Management Architecture for IPv4/IPv6 Networks 一种面向IPv4/IPv6网络的移动性管理架构
Zheng Xiang, Qiuli Kong
IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a solution to Mobile IPv4/v6 problems and gives an example when Home Agent(HA) located in IPv4 network, Correspondent Node(CN)located in IPv6 network, Mobile Node(MN) moving in IPv4/v6 mixed networks. A gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. As a transition scheme, the idea is to make the solution compatible with RFC3344 and RFC3775. In this way, the Mobile IP entities in IPv4 network and the Mobile IP entities in IPv6 network will be transparent to each other.
IETF分别在RFC3344和RFC3775中指定了移动IPv4和移动IPv6,但尚未在任何已发布的RFC中讨论移动IPv4/v6。本文提出了一种解决移动IPv4/v6问题的方法,并给出了在IPv4网络中HA (Home Agent)、IPv6网络中CN (Correspondent Node)、IPv4/v6混合网络中MN (Mobile Node)移动的实例。在IPv4网络和IPv6网络之间引入了移动IPv4/v6转换网关(MIPv4/v6- tg),该网关由NAT-PT网关和在NAT-PT网关基础上建立的移动IP应用层网关(MIP-ALG)组成。作为一个过渡方案,我们的想法是使解决方案与RFC3344和RFC3775兼容。这样,IPv4网络中的Mobile IP实体和IPv6网络中的Mobile IP实体就可以相互透明。
{"title":"A Mobility Management Architecture for IPv4/IPv6 Networks","authors":"Zheng Xiang, Qiuli Kong","doi":"10.1109/CyberC.2012.80","DOIUrl":"https://doi.org/10.1109/CyberC.2012.80","url":null,"abstract":"IETF has specified Mobile IPv4 and Mobile IPv6 in RFC3344 and RFC3775 respectively, but not yet discussed Mobile IPv4/v6 in any published RFC. This paper proposes a solution to Mobile IPv4/v6 problems and gives an example when Home Agent(HA) located in IPv4 network, Correspondent Node(CN)located in IPv6 network, Mobile Node(MN) moving in IPv4/v6 mixed networks. A gateway called Mobile IPv4/v6 translation gateway (MIPv4/v6-TG) is introduced to bridge between IPv4 network and IPv6 network, which is made up of a NAT-PT gateway and a Mobile IP application level gateway (MIP-ALG) built upon the NAT-PT gateway. As a transition scheme, the idea is to make the solution compatible with RFC3344 and RFC3775. In this way, the Mobile IP entities in IPv4 network and the Mobile IP entities in IPv6 network will be transparent to each other.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A measurement study on swarm evolution of BitTorrent BitTorrent群体演化的测量研究
Majing Su, Hongli Zhang, Binxing Fang, N. Yan
Studying the BitTorrent (BT) swarm evolution in different time scale is important to design accurate BT simulators and improve the performance of current BT systems. In this paper, we develop a hybrid measurement system incorporating both active and passive approaches. By exploiting DHT and PEX protocols in addition to traditional resources, we collect more extensive information compared to prior measurement systems. Based on the measurement results, we study the swarm evolution with different population in minute/hour/day scales, and discover that: (1) The swarm peer population is unbalanced, in that 74.6% torrents have no more than 1000 peers, (2) The lifetime of torrents can be divided into a fast growing stage, a dramatically shrinking stage, a sustaining stage and a slowly fading out stage in terms of swarm population, (3) Users' interest and diurnal periodicity are the main factors that influence the swarm evolution. The former dominates the first two stages, while the latter is decisive in the third stage. In this spirit, we raise an improved peer arrival rate model to describe the variation of the swarm population. Comparison results show that our model outperforms the state-of-the-art approach according to root mean square error and correlation coefficient.
研究BT在不同时间尺度下的群演化对设计精确的BT仿真器和提高BT系统的性能具有重要意义。在本文中,我们开发了一种结合主动和被动方法的混合测量系统。通过利用DHT和PEX协议以及传统资源,与之前的测量系统相比,我们收集了更广泛的信息。根据测量结果,我们在分钟/小时/天的尺度上研究了不同种群的群体演化,发现:(1)群体节点数量不平衡,74.6%的洪流节点数量不超过1000个;(2)洪流的生命周期可分为快速增长阶段、急剧萎缩阶段、持续阶段和缓慢淡出阶段;(3)用户兴趣和日周期性是影响群体进化的主要因素。前者在前两个阶段占主导地位,而后者在第三阶段起决定性作用。在此基础上,提出了一种改进的同伴到达率模型来描述蜂群种群的变化。对比结果表明,根据均方根误差和相关系数,我们的模型优于最先进的方法。
{"title":"A measurement study on swarm evolution of BitTorrent","authors":"Majing Su, Hongli Zhang, Binxing Fang, N. Yan","doi":"10.1109/CyberC.2012.94","DOIUrl":"https://doi.org/10.1109/CyberC.2012.94","url":null,"abstract":"Studying the BitTorrent (BT) swarm evolution in different time scale is important to design accurate BT simulators and improve the performance of current BT systems. In this paper, we develop a hybrid measurement system incorporating both active and passive approaches. By exploiting DHT and PEX protocols in addition to traditional resources, we collect more extensive information compared to prior measurement systems. Based on the measurement results, we study the swarm evolution with different population in minute/hour/day scales, and discover that: (1) The swarm peer population is unbalanced, in that 74.6% torrents have no more than 1000 peers, (2) The lifetime of torrents can be divided into a fast growing stage, a dramatically shrinking stage, a sustaining stage and a slowly fading out stage in terms of swarm population, (3) Users' interest and diurnal periodicity are the main factors that influence the swarm evolution. The former dominates the first two stages, while the latter is decisive in the third stage. In this spirit, we raise an improved peer arrival rate model to describe the variation of the swarm population. Comparison results show that our model outperforms the state-of-the-art approach according to root mean square error and correlation coefficient.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122761900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Rule-Based Control of Decentralised Asynchronous SOA for Real-Time Applications 基于规则的实时应用分散式异步SOA控制
Alexander Cameron, M. Stumptner, N. Nandagopal, W. Mayer, T. Mansell
In this paper we consider the core issues that are inhibiting the application of general Service Oriented Architecture (SOA) principles to distributed real-time military environments. In particular, we propose a Distributed Real-Time Service Oriented Architecture (DRT-SOA) framework intended to overcome some of the problems that distributed SOA systems face in needing to exhibit verifiable deterministic behaviour. Although the time behaviour of asynchronous systems is inherently non-deterministic, such systems offer advantages in terms of extensibility, cost and utilisation. We show that DRT-SOA presents a framework where the sources of non-determinism can be supressed, making it suitable for certain classes of real-time system. We also show that decentralised execution of complex workflows is achievable using dynamic rule-based logic. We also present preliminary results demonstrating the architecture's ability to perform decentralised execution of workflow and to resolve deadline constrained tasks. We also present results of a sensitivity analysis showing that the architectural framework is able to scale in support of dynamic redeployment of workflow. This has application when needing to adapt to changing run-time needs in the case of self-healing.
本文研究了制约通用面向服务体系结构(SOA)原则在分布式实时军事环境中应用的核心问题。特别是,我们提出了一个分布式实时面向服务架构(DRT-SOA)框架,旨在克服分布式SOA系统在需要展示可验证的确定性行为时所面临的一些问题。尽管异步系统的时间行为本质上是不确定的,但这种系统在可扩展性、成本和利用率方面具有优势。我们展示了DRT-SOA提供了一个框架,其中不确定性的来源可以被抑制,使其适合于某些类别的实时系统。我们还展示了使用基于动态规则的逻辑可以实现复杂工作流的分散执行。我们还展示了初步的结果,展示了架构执行工作流的分散执行和解决期限限制任务的能力。我们还提供了敏感性分析的结果,表明该架构框架能够扩展以支持工作流的动态重新部署。当需要在自我修复的情况下适应不断变化的运行时需求时,这是很有用的。
{"title":"Rule-Based Control of Decentralised Asynchronous SOA for Real-Time Applications","authors":"Alexander Cameron, M. Stumptner, N. Nandagopal, W. Mayer, T. Mansell","doi":"10.1109/CyberC.2012.48","DOIUrl":"https://doi.org/10.1109/CyberC.2012.48","url":null,"abstract":"In this paper we consider the core issues that are inhibiting the application of general Service Oriented Architecture (SOA) principles to distributed real-time military environments. In particular, we propose a Distributed Real-Time Service Oriented Architecture (DRT-SOA) framework intended to overcome some of the problems that distributed SOA systems face in needing to exhibit verifiable deterministic behaviour. Although the time behaviour of asynchronous systems is inherently non-deterministic, such systems offer advantages in terms of extensibility, cost and utilisation. We show that DRT-SOA presents a framework where the sources of non-determinism can be supressed, making it suitable for certain classes of real-time system. We also show that decentralised execution of complex workflows is achievable using dynamic rule-based logic. We also present preliminary results demonstrating the architecture's ability to perform decentralised execution of workflow and to resolve deadline constrained tasks. We also present results of a sensitivity analysis showing that the architectural framework is able to scale in support of dynamic redeployment of workflow. This has application when needing to adapt to changing run-time needs in the case of self-healing.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Biometrics-Based SSO Authentication Scheme in Telematics 基于生物特征的远程信息系统单点登录认证方案
Di Liu, Zhi-Jiang Zhang, Ni Zhang
This paper proposes a novel biometrics-based Single Sign On user authentication scheme in Telematics system, in order to enable to protect user account privacy. The contribution of this paper is to firstly combine biometrics with Single Sign On to replace traditional user authentication way by password in Telematics system. The use of biometrics will provide a high secure way to protect user data privacy, e.g., user's contact book, SMS or MMS records. And the use of Single Sign On offers users a convenient way that logs on only once, then access all services in the system involved with user account data.
本文提出了一种新的基于生物特征的远程信息处理系统用户单点登录认证方案,以实现对用户账户隐私的保护。本文的贡献在于首次将生物识别技术与单点登录技术相结合,取代了远程信息处理系统中传统的密码用户认证方式。使用生物识别技术将提供一种高度安全的方式来保护用户数据隐私,例如用户的通讯录、短信或彩信记录。单点登录为用户提供了一种方便的方式,只需登录一次,就可以访问系统中涉及用户帐户数据的所有服务。
{"title":"A Biometrics-Based SSO Authentication Scheme in Telematics","authors":"Di Liu, Zhi-Jiang Zhang, Ni Zhang","doi":"10.1109/CyberC.2012.39","DOIUrl":"https://doi.org/10.1109/CyberC.2012.39","url":null,"abstract":"This paper proposes a novel biometrics-based Single Sign On user authentication scheme in Telematics system, in order to enable to protect user account privacy. The contribution of this paper is to firstly combine biometrics with Single Sign On to replace traditional user authentication way by password in Telematics system. The use of biometrics will provide a high secure way to protect user data privacy, e.g., user's contact book, SMS or MMS records. And the use of Single Sign On offers users a convenient way that logs on only once, then access all services in the system involved with user account data.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116569529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uniform SystemC Co-Simulation Methodology for System-on-Chip Designs 片上系统设计的统一系统协同仿真方法
Xuexiang Wang, Weiwei Shan, Hao Liu
The increasing complexity of the current and future system-on-chip designs poses enormous challenges to system-level design. The uniform SystemC co-simulation methodology is proposed to describe the whole chip entirely with the same language. Elimination of the interaction between different simulators brings significant speedup in co-simulation. The processor model divides every instruction into a number of atomic operations, which makes it possible to accomplish fully cycle-accurate simulation. Meanwhile, the transaction-level-modeling communication model enables each hardware block to be built at different abstraction levels. The methodology is demonstrated by the exemplary design of a MP3 decoding system.
当前和未来的片上系统设计日益复杂,对系统级设计提出了巨大的挑战。提出了统一的SystemC协同仿真方法,用同一种语言完全描述整个芯片。消除了不同仿真器之间的交互,使联合仿真的速度得到了显著提高。处理器模型将每条指令划分为若干个原子操作,从而可以实现全周期精确的仿真。同时,事务级建模通信模型允许在不同的抽象级别构建每个硬件块。最后,以MP3解码系统的设计为例对该方法进行了验证。
{"title":"Uniform SystemC Co-Simulation Methodology for System-on-Chip Designs","authors":"Xuexiang Wang, Weiwei Shan, Hao Liu","doi":"10.1109/CyberC.2012.51","DOIUrl":"https://doi.org/10.1109/CyberC.2012.51","url":null,"abstract":"The increasing complexity of the current and future system-on-chip designs poses enormous challenges to system-level design. The uniform SystemC co-simulation methodology is proposed to describe the whole chip entirely with the same language. Elimination of the interaction between different simulators brings significant speedup in co-simulation. The processor model divides every instruction into a number of atomic operations, which makes it possible to accomplish fully cycle-accurate simulation. Meanwhile, the transaction-level-modeling communication model enables each hardware block to be built at different abstraction levels. The methodology is demonstrated by the exemplary design of a MP3 decoding system.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131969283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimization of Automatic Conversion of Serial C to Parallel OpenMP 串行C到并行OpenMP自动转换的优化
D. Dheeraj, B. Nitish, S. Ramesh
This paper implements a technique that enhances parallel execution of auto-generated OpenMP programs by considering architecture of on chip cache memory. It avoids false-sharing in 'for-loops' by generating OpenMP code for dynamically scheduling chunks by placing each core's data cache line size apart. An open-source parallelization tool called Par4All has been analyzed and its power has been unleashed to achieve maximum hardware utilization. Some of the computationally intensive programs from Poly Bench have been tested on different architectures, with different data sets and the results obtained reveal that the OpenMP codes generated by the enhanced technique have resulted in considerable speedup.
本文通过考虑片上高速缓存的结构,实现了一种提高自动生成OpenMP程序并行执行能力的技术。它通过将每个核心的数据缓存行大小分开来生成用于动态调度块的OpenMP代码,从而避免了“for循环”中的错误共享。我们分析了一个名为Par4All的开源并行化工具,并释放了它的功能,以实现最大的硬件利用率。在不同的体系结构和不同的数据集上测试了Poly Bench的一些计算密集型程序,结果表明,通过增强技术生成的OpenMP代码具有相当大的加速效果。
{"title":"Optimization of Automatic Conversion of Serial C to Parallel OpenMP","authors":"D. Dheeraj, B. Nitish, S. Ramesh","doi":"10.1109/CyberC.2012.59","DOIUrl":"https://doi.org/10.1109/CyberC.2012.59","url":null,"abstract":"This paper implements a technique that enhances parallel execution of auto-generated OpenMP programs by considering architecture of on chip cache memory. It avoids false-sharing in 'for-loops' by generating OpenMP code for dynamically scheduling chunks by placing each core's data cache line size apart. An open-source parallelization tool called Par4All has been analyzed and its power has been unleashed to achieve maximum hardware utilization. Some of the computationally intensive programs from Poly Bench have been tested on different architectures, with different data sets and the results obtained reveal that the OpenMP codes generated by the enhanced technique have resulted in considerable speedup.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133237297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Clustering Routing Algorithm Based on Reliability in Wireless Sensor Network 基于可靠性的无线传感器网络聚类路由算法
Dong Ting
A clustering routing algorithm based on reliability (CRAR) is proposed in this paper, for the sake of improving reliability of clustering routing algorithm. CRAR introduces the random package model and divides the net into several areas by using the size of net and positions of nodes. First, the reference node in the line from source to sink is found. And then, the node which is reliable and nearest to sink in the next hop cluster head candidate area is selected as next hop cluster head by using the reference node's position. In each area, cluster head can cover the whole area and is responsible for collecting information and transmitting packages. Certainly, non-cluster-heads are dormant in order to reduce energy consumption. Both theory and simulation show that CRAR is more efficient and reliable than Ad Hoc on-demand multi-path distance vector routing(AOMDV) and Low Energy Adaptive Clustering Hierarchy (LEACH). At the same time, it can avoid broadcast storm effectively.
为了提高聚类路由算法的可靠性,提出了一种基于可靠性的聚类路由算法。CRAR引入随机包模型,利用网络的大小和节点的位置将网络划分为若干区域。首先,找到从源到接收的行中的参考节点。然后,根据参考节点的位置选择下一跳簇头候选区域中最可靠且离sink最近的节点作为下一跳簇头。在每个区域,集群负责人可以覆盖整个区域,负责收集信息和发送数据包。当然,非簇头节点处于休眠状态是为了减少能耗。理论和仿真结果表明,CRAR算法比Ad Hoc按需多路径距离矢量路由(AOMDV)和低能量自适应聚类层次(LEACH)算法更高效可靠。同时,它可以有效地避免广播风暴。
{"title":"A Clustering Routing Algorithm Based on Reliability in Wireless Sensor Network","authors":"Dong Ting","doi":"10.1109/CyberC.2012.71","DOIUrl":"https://doi.org/10.1109/CyberC.2012.71","url":null,"abstract":"A clustering routing algorithm based on reliability (CRAR) is proposed in this paper, for the sake of improving reliability of clustering routing algorithm. CRAR introduces the random package model and divides the net into several areas by using the size of net and positions of nodes. First, the reference node in the line from source to sink is found. And then, the node which is reliable and nearest to sink in the next hop cluster head candidate area is selected as next hop cluster head by using the reference node's position. In each area, cluster head can cover the whole area and is responsible for collecting information and transmitting packages. Certainly, non-cluster-heads are dormant in order to reduce energy consumption. Both theory and simulation show that CRAR is more efficient and reliable than Ad Hoc on-demand multi-path distance vector routing(AOMDV) and Low Energy Adaptive Clustering Hierarchy (LEACH). At the same time, it can avoid broadcast storm effectively.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125607825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1