首页 > 最新文献

2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)最新文献

英文 中文
A wearable virtual coach for Marathon beginners 专为马拉松初学者设计的可穿戴虚拟教练
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097908
Jr-Jung Chen, Yi-Fan Chung, Chiu-Ping Chang, C. King, Cheng-Hsin Hsu
Marathon is very popular in recent years. However, finishing the game is no easy task, especially for beginners. Regular practices and training are needed. With the availability of wearable devices, it is possible to develop virtual coaches that monitor the progresses of individual runners closeup and guide them through tailor-made training schedules. Unfortunately, most existing wearable devices only record physiological signals of the runners and rely on off-line processing to provide feedbacks. In this paper, we present the design and development of an on-line virtual coach, which performs real-time tracking and analysis of the physiological status of the runner and suggests appropriate adjustments on the exercise intensity. The proposed virtual coach is a pure software solution and can work with any wearable device that monitors the heart rate and running speed of the runner. The main challenge of our system is to predict when the runner will reach the various running states and instruct the runner to adjust the speed just ahead of time so that her/his body can react in time to maintain the required training intensity. Experiments on real users show that our proposed algorithms can correctly predict the running states of the runners and help them to better maintain the required intensity to maximize the training effects.
马拉松近年来很受欢迎。然而,完成游戏并不是一件容易的事,尤其是对初学者来说。需要定期练习和培训。随着可穿戴设备的出现,有可能开发出虚拟教练,近距离监控单个跑步者的进步,并指导他们完成量身定制的训练计划。遗憾的是,现有的可穿戴设备大多只记录跑步者的生理信号,依靠离线处理来提供反馈。本文设计并开发了一种在线虚拟教练,可以实时跟踪和分析跑步者的生理状态,并提出适当的运动强度调整建议。拟议中的虚拟教练是一个纯软件解决方案,可以与任何监测跑步者心率和跑步速度的可穿戴设备一起工作。我们系统的主要挑战是预测跑步者何时会达到各种跑步状态,并指导跑步者提前调整速度,使她/他的身体能够及时做出反应,以保持所需的训练强度。在真实用户身上的实验表明,我们提出的算法可以正确预测跑步者的跑步状态,帮助他们更好地保持所需的强度,从而达到最大的训练效果。
{"title":"A wearable virtual coach for Marathon beginners","authors":"Jr-Jung Chen, Yi-Fan Chung, Chiu-Ping Chang, C. King, Cheng-Hsin Hsu","doi":"10.1109/PADSW.2014.7097908","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097908","url":null,"abstract":"Marathon is very popular in recent years. However, finishing the game is no easy task, especially for beginners. Regular practices and training are needed. With the availability of wearable devices, it is possible to develop virtual coaches that monitor the progresses of individual runners closeup and guide them through tailor-made training schedules. Unfortunately, most existing wearable devices only record physiological signals of the runners and rely on off-line processing to provide feedbacks. In this paper, we present the design and development of an on-line virtual coach, which performs real-time tracking and analysis of the physiological status of the runner and suggests appropriate adjustments on the exercise intensity. The proposed virtual coach is a pure software solution and can work with any wearable device that monitors the heart rate and running speed of the runner. The main challenge of our system is to predict when the runner will reach the various running states and instruct the runner to adjust the speed just ahead of time so that her/his body can react in time to maintain the required training intensity. Experiments on real users show that our proposed algorithms can correctly predict the running states of the runners and help them to better maintain the required intensity to maximize the training effects.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130160402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Reducing lock contention on multi-core platforms 减少多核平台上的锁争用
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097804
Haimiao Ding, Xiaofei Liao, Hai Jin, Xinqiao Lv, Rentong Guo
As multi-core platforms with hundreds or even more quantities of cores are popular, system optimization issues, including lock contentions, start to puzzle programmers who work on multi-core platforms. Locks are more convenient and clear than lock-free operations (for example, transactional memory) for multi-core programmers. However, lock contention has been recognized as a typical impediment to the performance of shared-memory parallel programs. This paper mainly discusses two important reasons that cause lock contention, including large critical sections and frequent lock requests. For current solutions, it is hard for programmers to find the locations of large critical sections and good scheme to reduce lock contentions on hot critical sections. This paper proposes FFlocker, a series of runtime solutions that reduce lock contention caused by the two issues. FFlocker includes a profiling algorithm to find the locations of large critical sections. Based on the profiling scheme, it binds the threads acquiring the same locks onto the same core. We evaluate our techniques with three benchmarks. The results show that FFlocker offers better performance than Function Flow and OpenMP.
随着拥有数百甚至更多核的多核平台的流行,系统优化问题(包括锁争用)开始困扰在多核平台上工作的程序员。对于多核程序员来说,锁比无锁操作(例如,事务性内存)更方便、更清晰。然而,锁争用已经被认为是影响共享内存并行程序性能的一个典型障碍。本文主要讨论了导致锁争用的两个重要原因,即大临界区和频繁的锁请求。对于目前的解决方案,程序员很难找到大临界区的位置和减少热临界区的锁争用的好方案。本文提出了一系列运行时解决方案FFlocker,以减少这两个问题引起的锁争用。FFlocker包括一个分析算法,用于查找大临界区域的位置。基于分析方案,它将获得相同锁的线程绑定到相同的核上。我们用三个基准来评估我们的技术。结果表明,FFlocker的性能优于Function Flow和OpenMP。
{"title":"Reducing lock contention on multi-core platforms","authors":"Haimiao Ding, Xiaofei Liao, Hai Jin, Xinqiao Lv, Rentong Guo","doi":"10.1109/PADSW.2014.7097804","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097804","url":null,"abstract":"As multi-core platforms with hundreds or even more quantities of cores are popular, system optimization issues, including lock contentions, start to puzzle programmers who work on multi-core platforms. Locks are more convenient and clear than lock-free operations (for example, transactional memory) for multi-core programmers. However, lock contention has been recognized as a typical impediment to the performance of shared-memory parallel programs. This paper mainly discusses two important reasons that cause lock contention, including large critical sections and frequent lock requests. For current solutions, it is hard for programmers to find the locations of large critical sections and good scheme to reduce lock contentions on hot critical sections. This paper proposes FFlocker, a series of runtime solutions that reduce lock contention caused by the two issues. FFlocker includes a profiling algorithm to find the locations of large critical sections. Based on the profiling scheme, it binds the threads acquiring the same locks onto the same core. We evaluate our techniques with three benchmarks. The results show that FFlocker offers better performance than Function Flow and OpenMP.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126525681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A fully generalized over operator with applications to image composition in parallel visualization for big data science 一个完全广义的over算子及其在大数据科学并行可视化图像合成中的应用
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097854
Dongliang Chu, C. Wu, Zongmin Wang, Yongqiang Wang
The over operator is commonly used for α-blending in various visualization techniques. In the current form, it is a binary operator and must respect the restriction of order dependency, hence posing a significant performance limit. This paper proposes a fully generalized version of this operator. Compared with its predecessor, the fully generalized over operator is not only n-operator compatible but also any-order friendly. To demonstrate the advantages of the proposed operator, we apply it to the asynchronous and order-dependent image composition problem in parallel visualization for big data science and further parallelize it for performance improvement. We conduct theoretical analyses to establish the performance superiority of the proposed over operator in comparison with its original form, which is further validated by extensive experimental results in the context of real-life scientific visualization.
在各种可视化技术中,过算符通常用于α-混合。在目前的形式下,它是一个二进制运算符,必须遵守顺序依赖的限制,因此造成了很大的性能限制。本文提出了该算子的一个完全广义版本。与它的前身相比,完全广义上算子不仅兼容n算子,而且是任意阶友好的。为了证明所提出的算子的优势,我们将其应用于大数据科学并行可视化中的异步和顺序依赖的图像合成问题,并进一步并行化以提高性能。我们进行了理论分析,与原始形式相比,建立了所提出的over算子的性能优势,并通过实际科学可视化背景下的大量实验结果进一步验证了这一点。
{"title":"A fully generalized over operator with applications to image composition in parallel visualization for big data science","authors":"Dongliang Chu, C. Wu, Zongmin Wang, Yongqiang Wang","doi":"10.1109/PADSW.2014.7097854","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097854","url":null,"abstract":"The over operator is commonly used for α-blending in various visualization techniques. In the current form, it is a binary operator and must respect the restriction of order dependency, hence posing a significant performance limit. This paper proposes a fully generalized version of this operator. Compared with its predecessor, the fully generalized over operator is not only n-operator compatible but also any-order friendly. To demonstrate the advantages of the proposed operator, we apply it to the asynchronous and order-dependent image composition problem in parallel visualization for big data science and further parallelize it for performance improvement. We conduct theoretical analyses to establish the performance superiority of the proposed over operator in comparison with its original form, which is further validated by extensive experimental results in the context of real-life scientific visualization.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126796911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combination feature for image retrieval in the distributed datacenter 分布式数据中心图像检索的组合特性
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097871
Di Yang, J. Liao, Q. Qi, Jingyu Wang, Haifeng Sun, Shantao Jiang
Since the emergence of cloud datacenters provides an enormous amount of resources easily accessible to people, it is challenging to provide an efficient search framework in such a distributed environment. However, traditional search techniques only allow users to search images over exact-match keywords through a centralized index. These methods are insufficient to meet requirements of content based image retrieval (CBIR) and more powerful search frameworks are needed. In this paper, we present LCFIR, an effective image retrieval framework for fast content location in the distributed situation. It adopts the peer-to-peer paradigm and combines color and edge features. The basic idea is to construct multiple replicas of an image's index through exploiting the property of Locality Sensitive Hashing (LSH). Thus, the indexes of similar images are probabilistically gathered into the same node without the knowledge of any global information. The empirical results show that the system is able to yield high accuracy with load balancing, and only contacts a few number of the participating nodes.
由于云数据中心的出现为人们提供了大量易于访问的资源,因此在这样一个分布式环境中提供高效的搜索框架是一项挑战。然而,传统的搜索技术只允许用户通过集中索引在精确匹配的关键字上搜索图像。这些方法不足以满足基于内容的图像检索(CBIR)的要求,需要更强大的搜索框架。在本文中,我们提出了一种有效的图像检索框架LCFIR,用于在分布式情况下快速定位内容。它采用点对点模式,结合了颜色和边缘特征。其基本思想是通过利用局域敏感散列(Locality Sensitive hash, LSH)的特性来构建图像索引的多个副本。这样,在不知道任何全局信息的情况下,将相似图像的索引概率地聚集到同一节点。实验结果表明,在负载均衡的情况下,该系统能够产生较高的准确率,并且只接触少量的参与节点。
{"title":"Combination feature for image retrieval in the distributed datacenter","authors":"Di Yang, J. Liao, Q. Qi, Jingyu Wang, Haifeng Sun, Shantao Jiang","doi":"10.1109/PADSW.2014.7097871","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097871","url":null,"abstract":"Since the emergence of cloud datacenters provides an enormous amount of resources easily accessible to people, it is challenging to provide an efficient search framework in such a distributed environment. However, traditional search techniques only allow users to search images over exact-match keywords through a centralized index. These methods are insufficient to meet requirements of content based image retrieval (CBIR) and more powerful search frameworks are needed. In this paper, we present LCFIR, an effective image retrieval framework for fast content location in the distributed situation. It adopts the peer-to-peer paradigm and combines color and edge features. The basic idea is to construct multiple replicas of an image's index through exploiting the property of Locality Sensitive Hashing (LSH). Thus, the indexes of similar images are probabilistically gathered into the same node without the knowledge of any global information. The empirical results show that the system is able to yield high accuracy with load balancing, and only contacts a few number of the participating nodes.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127558871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DLBS: Decentralized load balancing scheme for event-driven cloud frameworks DLBS:用于事件驱动云框架的分散负载平衡方案
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097896
Changlong Li, Xuehai Zhou, Mingming Sun, Kun Lu, Jinhong Zhou, Hang Zhuang, Dong Dai
With the development of cloud computing, more and more applications are moving to a distributed fashion to solve problems. These applications usually contain complex iterative or incremental procedures and have a more urgent requirement on low-latency. Thus many event-driven cloud frameworks are proposed. To optimize this kind of frameworks, an efficient strategy to minimize the execution time by redistributing work- loads is needed. Nowadays, load balance is a critical issue for the efficient operation of cloud platforms and many centralized schemes have already been proposed. However, few of them have been designed to support event-driven frameworks. Besides, as the cluster size and volume of tasks increases, centralized scheme will lead to a bottleneck of master node. In this paper, we demonstrate a decentralized load balancing scheme named DLBS for event-driven cloud frameworks and present two technologies to optimize it. In our design, schedulers are placed in every node for independently load-monitoring, autonomous decision-making and parallel task-scheduling. With the help of DLBS, master frees from the burden and tasks are executed with lower latency. We analyze the excellence of DLBS theoretically and proof it through simulation. At last, we implement and deploy it on a 64-machine cluster and demonstrate that it performs within 20% of an ideal scheme, which are consistent with simulation results.
随着云计算的发展,越来越多的应用程序正在转向分布式方式来解决问题。这些应用程序通常包含复杂的迭代或增量过程,并且对低延迟有更迫切的要求。因此,人们提出了许多事件驱动的云框架。为了优化这类框架,需要一种有效的策略,通过重新分配工作负载来最小化执行时间。目前,负载均衡是云平台高效运行的关键问题,已经提出了许多集中的方案。然而,它们中很少被设计成支持事件驱动的框架。此外,随着集群规模和任务量的增加,集中式方案会导致主节点的瓶颈。在本文中,我们展示了一种名为DLBS的分散负载平衡方案,用于事件驱动的云框架,并提出了两种技术来优化它。在我们的设计中,调度程序被放置在每个节点中,用于独立的负载监控、自主决策和并行任务调度。在DLBS的帮助下,master摆脱了负担,以更低的延迟执行任务。从理论上分析了DLBS的优越性,并通过仿真验证了其优越性。最后,我们在一个64机集群上进行了实现和部署,结果表明,该方案的性能在理想方案的20%以内,与仿真结果一致。
{"title":"DLBS: Decentralized load balancing scheme for event-driven cloud frameworks","authors":"Changlong Li, Xuehai Zhou, Mingming Sun, Kun Lu, Jinhong Zhou, Hang Zhuang, Dong Dai","doi":"10.1109/PADSW.2014.7097896","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097896","url":null,"abstract":"With the development of cloud computing, more and more applications are moving to a distributed fashion to solve problems. These applications usually contain complex iterative or incremental procedures and have a more urgent requirement on low-latency. Thus many event-driven cloud frameworks are proposed. To optimize this kind of frameworks, an efficient strategy to minimize the execution time by redistributing work- loads is needed. Nowadays, load balance is a critical issue for the efficient operation of cloud platforms and many centralized schemes have already been proposed. However, few of them have been designed to support event-driven frameworks. Besides, as the cluster size and volume of tasks increases, centralized scheme will lead to a bottleneck of master node. In this paper, we demonstrate a decentralized load balancing scheme named DLBS for event-driven cloud frameworks and present two technologies to optimize it. In our design, schedulers are placed in every node for independently load-monitoring, autonomous decision-making and parallel task-scheduling. With the help of DLBS, master frees from the burden and tasks are executed with lower latency. We analyze the excellence of DLBS theoretically and proof it through simulation. At last, we implement and deploy it on a 64-machine cluster and demonstrate that it performs within 20% of an ideal scheme, which are consistent with simulation results.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115149752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of OpenDaylight SDN controller OpenDaylight SDN控制器的性能评估
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097868
Zuhran Khan Khattak, M. Awais, Adnan Iqbal
Enourmous amount of data has resulted into large data centres. Virtual machines and virtual networks are an integral part of large data centres. As a result, software defined network controllers have emerged as viable solution to manage such networks. The performance analysis of network controllers is generally carried out through benchmarking. Although several benchmarking studies exist, recently launched OpenDaylight SDN Controller is not considered in any benchmarking study yet. In this paper, we present initial results of benchmarking of Open-Daylight SDN Controller with well known Floodlight controller. We present latency and throughput results of OpenDaylight SDN Controller and Floodlight under different scenarios. We find that OpenDaylight SDN Controller has low average responses as compared to Floodlight. We also note that the standard benchmarking tool - Cbench - has no support for real traffic patterns in a data centre, since data centre traffic is considerably complex. In addition to benchmarking of OpenDaylight SDN Controller, we propose modifications in Cbench to accommodate models of real traffic in data centres. We also discuss our initial implementation.
海量的数据形成了大型的数据中心。虚拟机和虚拟网络是大型数据中心的组成部分。因此,软件定义的网络控制器已成为管理此类网络的可行解决方案。网络控制器的性能分析一般通过基准测试进行。虽然存在一些基准研究,但最近推出的OpenDaylight SDN控制器尚未被考虑在任何基准研究中。在本文中,我们介绍了Open-Daylight SDN控制器与众所周知的泛光灯控制器的基准测试的初步结果。我们给出了OpenDaylight SDN控制器和泛光灯在不同场景下的延迟和吞吐量结果。我们发现OpenDaylight SDN控制器与泛光灯相比具有较低的平均响应。我们还注意到,标准基准测试工具—Cbench—不支持数据中心中的实际流量模式,因为数据中心流量相当复杂。除了对OpenDaylight SDN控制器进行基准测试外,我们还建议在chbench中进行修改,以适应数据中心的真实流量模型。我们还讨论了我们的初始实现。
{"title":"Performance evaluation of OpenDaylight SDN controller","authors":"Zuhran Khan Khattak, M. Awais, Adnan Iqbal","doi":"10.1109/PADSW.2014.7097868","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097868","url":null,"abstract":"Enourmous amount of data has resulted into large data centres. Virtual machines and virtual networks are an integral part of large data centres. As a result, software defined network controllers have emerged as viable solution to manage such networks. The performance analysis of network controllers is generally carried out through benchmarking. Although several benchmarking studies exist, recently launched OpenDaylight SDN Controller is not considered in any benchmarking study yet. In this paper, we present initial results of benchmarking of Open-Daylight SDN Controller with well known Floodlight controller. We present latency and throughput results of OpenDaylight SDN Controller and Floodlight under different scenarios. We find that OpenDaylight SDN Controller has low average responses as compared to Floodlight. We also note that the standard benchmarking tool - Cbench - has no support for real traffic patterns in a data centre, since data centre traffic is considerably complex. In addition to benchmarking of OpenDaylight SDN Controller, we propose modifications in Cbench to accommodate models of real traffic in data centres. We also discuss our initial implementation.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127587796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
A victim and rescuer communication model in collapsed buildings/structures 倒塌建筑物/构筑物中的受害者与救援者沟通模型
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097887
Tanapat Anusas-Amornkul
In a disaster hit area, infrastructure networks may be disconnected and main communications between victims and rescuers are not available. An interesting question is that how many people are trapped in a collapsed building and how close they are to a nearby rescuer's position. A smart-phone is widely used today and it normally has a Wi-Fi function to connect to the Internet. The phone can be used for saving victims' lives. In this paper, a communication model is proposed for a victim to communicate with others and also a rescuer to communicate with victims. State diagrams of the victim and rescuer models are proposed along with pseudo codes for the model operation. An example communication scenario is presented to demonstrate how the model works.
在受灾地区,基础设施网络可能会中断,受害者和救援人员之间的主要通信也无法使用。一个有趣的问题是,有多少人被困在倒塌的建筑物里,他们离附近的救援人员有多近。智能手机如今被广泛使用,它通常具有Wi-Fi功能来连接互联网。这款手机可以用来挽救受害者的生命。本文提出了受害者与他人沟通的沟通模式,以及救援者与受害者沟通的沟通模式。提出了受害者和救援者模型的状态图以及模型运行的伪代码。给出了一个示例通信场景来演示该模型是如何工作的。
{"title":"A victim and rescuer communication model in collapsed buildings/structures","authors":"Tanapat Anusas-Amornkul","doi":"10.1109/PADSW.2014.7097887","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097887","url":null,"abstract":"In a disaster hit area, infrastructure networks may be disconnected and main communications between victims and rescuers are not available. An interesting question is that how many people are trapped in a collapsed building and how close they are to a nearby rescuer's position. A smart-phone is widely used today and it normally has a Wi-Fi function to connect to the Internet. The phone can be used for saving victims' lives. In this paper, a communication model is proposed for a victim to communicate with others and also a rescuer to communicate with victims. State diagrams of the victim and rescuer models are proposed along with pseudo codes for the model operation. An example communication scenario is presented to demonstrate how the model works.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133208045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A privacy-aware cloud service selection method toward data life-cycle 面向数据生命周期的具有隐私意识的云服务选择方法
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097878
Li Lin, Tingting Liu, Jian Hu, Jian-biao Zhang
Recent years have witnessed the rapid development of cloud computing, which leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. However, a significant barrier to the adoption of cloud services is that users fear data leakage and loss of privacy if their sensitive data is processed in the cloud. Hence, the cloud customer must be able to select appropriate services according to his or her privacy and security needs. In this paper, we propose a novel cloud service selection method called PCSS, where a cloud service is estimated based on its capability of privacy protection (CoPP) covering the entire life-cycle of users' data. A scalable assessment index system with a 2-level hierarchy structure is constructed to analyze and quantify the CoPP of cloud service. The first-level index is composed of all stages of data life-cycle and the second-level index involves privacy-aware security mechanisms at each stage. We employ a fuzzy comprehensive evaluation technique to count the privacy-preserving value of security mechanism. An AHP- based approach is exploited to decide the impact weight of different security mechanisms to the CoPP of each stage. By calculating a comprehensive CoPP metric of all life-cycle stages, all cloud services can be sorted and recommended to users. An example analysis is given, and the reasonableness of the proposed method is proved. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the baseline method at the service selection performance.
近年来见证了云计算的快速发展,它以随时随地按需付费的方式为云客户提供独特的服务。然而,采用云服务的一个重大障碍是,如果用户的敏感数据在云中处理,他们担心数据泄露和隐私丧失。因此,云客户必须能够根据他或她的隐私和安全需求选择适当的服务。在本文中,我们提出了一种新的云服务选择方法,称为PCSS,其中云服务的隐私保护能力(CoPP)覆盖用户数据的整个生命周期来评估。构建了一个可扩展的两级层次结构的评估指标体系,对云服务的CoPP进行分析和量化。第一级索引由数据生命周期的所有阶段组成,第二级索引在每个阶段都涉及隐私感知安全机制。采用模糊综合评价技术对安全机制的隐私保护价值进行计算。利用基于层次分析法的方法确定不同安全机制对各阶段CoPP的影响权重。通过计算所有生命周期阶段的综合CoPP指标,可以对所有云服务进行排序并向用户推荐。通过实例分析,证明了所提方法的合理性。通过与基线方法在服务选择性能上的比较,验证了该方法的有效性。
{"title":"A privacy-aware cloud service selection method toward data life-cycle","authors":"Li Lin, Tingting Liu, Jian Hu, Jian-biao Zhang","doi":"10.1109/PADSW.2014.7097878","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097878","url":null,"abstract":"Recent years have witnessed the rapid development of cloud computing, which leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. However, a significant barrier to the adoption of cloud services is that users fear data leakage and loss of privacy if their sensitive data is processed in the cloud. Hence, the cloud customer must be able to select appropriate services according to his or her privacy and security needs. In this paper, we propose a novel cloud service selection method called PCSS, where a cloud service is estimated based on its capability of privacy protection (CoPP) covering the entire life-cycle of users' data. A scalable assessment index system with a 2-level hierarchy structure is constructed to analyze and quantify the CoPP of cloud service. The first-level index is composed of all stages of data life-cycle and the second-level index involves privacy-aware security mechanisms at each stage. We employ a fuzzy comprehensive evaluation technique to count the privacy-preserving value of security mechanism. An AHP- based approach is exploited to decide the impact weight of different security mechanisms to the CoPP of each stage. By calculating a comprehensive CoPP metric of all life-cycle stages, all cloud services can be sorted and recommended to users. An example analysis is given, and the reasonableness of the proposed method is proved. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the baseline method at the service selection performance.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125581215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving smart grid authentication using Merkle Trees 使用默克尔树改进智能电网认证
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097884
Melesio Calderon Munoz, M. Moh, Teng-Sheng Moh
The electrical power grid forms the functional foundation of our modern societies, but in the near future our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations worldwide have started to convert their power grids into smart grids that will have improved communication and control systems. A smart grid will be better able to incorporate new forms of energy generation as well as be self-healing and more reliable. This paper investigates a threat to wireless communication networks from a fully realized quantum computer, and provides a means to avoid this problem in smart grid domains. We discuss and compare the security aspects, the complexities and the performance of authentication using public-key cryptography and using Merkel Trees. As a result, we argue for the use of Merkle Trees as opposed to public key encryption for authentication of devices in wireless mesh networks (WMN) used in smart grid applications.
电网构成了现代社会的功能基础,但在不久的将来,我们老化的电力基础设施将无法满足我们的需求。因此,世界各国已开始将其电网转变为智能电网,这将改善通信和控制系统。智能电网将能够更好地整合新形式的能源发电,并具有自我修复能力,更加可靠。本文研究了完全实现的量子计算机对无线通信网络的威胁,并提供了在智能电网领域避免这一问题的方法。我们讨论并比较了使用公钥加密和使用默克尔树进行身份验证的安全性、复杂性和性能。因此,我们主张使用默克尔树而不是公钥加密来对智能电网应用中使用的无线网状网络(WMN)中的设备进行身份验证。
{"title":"Improving smart grid authentication using Merkle Trees","authors":"Melesio Calderon Munoz, M. Moh, Teng-Sheng Moh","doi":"10.1109/PADSW.2014.7097884","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097884","url":null,"abstract":"The electrical power grid forms the functional foundation of our modern societies, but in the near future our aging electrical infrastructure will not be able to keep pace with our demands. As a result, nations worldwide have started to convert their power grids into smart grids that will have improved communication and control systems. A smart grid will be better able to incorporate new forms of energy generation as well as be self-healing and more reliable. This paper investigates a threat to wireless communication networks from a fully realized quantum computer, and provides a means to avoid this problem in smart grid domains. We discuss and compare the security aspects, the complexities and the performance of authentication using public-key cryptography and using Merkel Trees. As a result, we argue for the use of Merkle Trees as opposed to public key encryption for authentication of devices in wireless mesh networks (WMN) used in smart grid applications.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing scalability in distributed storage systems with Cauchy Reed-Solomon codes 利用Cauchy Reed-Solomon代码增强分布式存储系统的可扩展性
Pub Date : 2014-12-01 DOI: 10.1109/PADSW.2014.7097849
Si Wu, Yinlong Xu, Yongkun Li, Yunfeng Zhu
System scaling becomes essential and indispensable for distributed storage systems due to the explosive growth of data volume. As fault-protection is also a necessity in large-scale distributed storage systems, and Cauchy Reed-Solomon (CRS) codes are widely deployed to tolerate multiple simultaneous node failures, this paper studies the scaling of distributed storage systems with CRS codes. In particular, we formulate the scaling problem with an optimization model in which both the post-scaling encoding matrix and the data migration policy are assumed to be unknown in advance. To minimize the I/O overhead for CRS scaling, we first derive the optimal post-scaling encoding matrix under a given data migration policy, and then optimize the data migration process using the selected postscaling encoding matrix. Our scaling scheme requires the minimal data movement while achieving uniform data distribution. To validate the efficiency of our scheme, we implement it atop a networked file system. Extensive experiments show that our scaling scheme reduces 7.94% to 58.87%, and 39.52% on average, of the scaling time over the basic scheme.
由于数据量的爆炸式增长,系统扩展成为分布式存储系统必不可少的一部分。由于故障保护在大规模分布式存储系统中也是必不可少的,并且CRS码被广泛应用于容忍多个节点同时故障,因此本文研究了基于CRS码的分布式存储系统的扩展问题。特别地,我们用一个优化模型来表述缩放问题,该模型假设缩放后的编码矩阵和数据迁移策略都是事先未知的。为了最小化CRS扩展的I/O开销,我们首先推导出给定数据迁移策略下的最优扩展后编码矩阵,然后使用所选的后缩放编码矩阵对数据迁移过程进行优化。我们的扩展方案需要最小的数据移动,同时实现均匀的数据分布。为了验证我们的方案的效率,我们在一个网络文件系统上实现了它。大量的实验表明,与基本方案相比,我们的扩容方案将扩容时间缩短了7.94%至58.87%,平均缩短了39.52%。
{"title":"Enhancing scalability in distributed storage systems with Cauchy Reed-Solomon codes","authors":"Si Wu, Yinlong Xu, Yongkun Li, Yunfeng Zhu","doi":"10.1109/PADSW.2014.7097849","DOIUrl":"https://doi.org/10.1109/PADSW.2014.7097849","url":null,"abstract":"System scaling becomes essential and indispensable for distributed storage systems due to the explosive growth of data volume. As fault-protection is also a necessity in large-scale distributed storage systems, and Cauchy Reed-Solomon (CRS) codes are widely deployed to tolerate multiple simultaneous node failures, this paper studies the scaling of distributed storage systems with CRS codes. In particular, we formulate the scaling problem with an optimization model in which both the post-scaling encoding matrix and the data migration policy are assumed to be unknown in advance. To minimize the I/O overhead for CRS scaling, we first derive the optimal post-scaling encoding matrix under a given data migration policy, and then optimize the data migration process using the selected postscaling encoding matrix. Our scaling scheme requires the minimal data movement while achieving uniform data distribution. To validate the efficiency of our scheme, we implement it atop a networked file system. Extensive experiments show that our scaling scheme reduces 7.94% to 58.87%, and 39.52% on average, of the scaling time over the basic scheme.","PeriodicalId":421740,"journal":{"name":"2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2014 20th IEEE International Conference on Parallel and Distributed Systems (ICPADS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1