首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Research Issues and Challenges to Advance System Software  for Multicore Processors and Data-Intensive Applications 多核处理器和数据密集型应用的先进系统软件的研究问题和挑战
Xiaodong Zhang
Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of "memory wall" has been shifted to "disk wall" that is a serious bottleneck for many data- intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems. We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit "sequential locality" - for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.
与多核处理器的快速技术进步和从计算密集型到高度数据密集型应用程序的快速变化相比,操作系统的发展已经非常缓慢了几十年。在当今的计算环境中,应用程序用户面临着两大挑战。在系统层次结构的顶层,为多个内核并发访问配备了私有和共享缓存,这不可避免地会导致访问冲突,从而降低执行性能。在底层,“内存墙”的性能瓶颈已经转移到“磁盘墙”,这是许多数据密集型应用程序的严重瓶颈。由于处理器缓存和磁盘存储不在操作系统管理的主要范围内,并且它们日益复杂的操作对应用程序用户并不透明,因此上述性能问题在任何级别的计算机系统中都没有得到有效解决。我们一直致力提升操作系统,目的有二:(1)善用多核处理器丰富而复杂的资源,以及(2)尽快存取磁碟资料。在多核处理器级别,我们正在开发新的资源分配管理,以提高每个核心和/或每个线程的有效缓存容量,并通过协调内存带宽共享来最小化片外内存访问中的拥塞。在存储级别,我们使操作系统能够有效地利用“顺序局部性”——对于相同数量的数据,顺序访问要比磁盘中的随机访问快几个数量级。在这次演讲中,将概述相关的研究问题和挑战,并介绍初步结果。
{"title":"Research Issues and Challenges to Advance System Software  for Multicore Processors and Data-Intensive Applications","authors":"Xiaodong Zhang","doi":"10.1109/EUC.2008.189","DOIUrl":"https://doi.org/10.1109/EUC.2008.189","url":null,"abstract":"Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of \"memory wall\" has been shifted to \"disk wall\" that is a serious bottleneck for many data- intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems. We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit \"sequential locality\" - for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRAcME: Temporal Activity Recognition Using Mobile Phone Data TRAcME:利用移动电话数据进行时间活动识别
Driss Choujaa, Naranker Dulay
The aim of human activity recognition is to identify what a user or a group of users are doing at a given point in time, for example travelling or working. Activity recognition plays an important role in mobile and ubiquitous computing both as a goal in itself and as an intermediate task in the design of advanced applications. Virtually all existing activity recognition systems for mobile phones base their predictions on location cues. This approach forces the user to disclose personal information such as her home or work area. In this paper, we present a novel activity recognition system called TRAcME (temporal recognition of activities for mobile environments) which recognises generic human activities from large windows of context, Allenpsilas temporal relations and anonymous landmarks. Unlike existing systems, TRAcME handles simultaneous activities and outputs activities which are consistent with each other at the scale of a userpsilas day.
人类活动识别的目的是识别一个用户或一组用户在给定的时间点上正在做什么,例如旅行或工作。活动识别在移动计算和普适计算中扮演着重要的角色,无论是作为目标本身还是作为高级应用程序设计的中间任务。实际上,所有现有的手机活动识别系统都是基于位置线索进行预测的。这种方法迫使用户公开个人信息,例如她的家庭或工作区域。在本文中,我们提出了一种新的活动识别系统,称为TRAcME(移动环境活动的时间识别),它从大的上下文窗口、Allenpsilas时间关系和匿名地标识别一般的人类活动。与现有系统不同,TRAcME处理同时进行的活动,并以用户日为单位输出彼此一致的活动。
{"title":"TRAcME: Temporal Activity Recognition Using Mobile Phone Data","authors":"Driss Choujaa, Naranker Dulay","doi":"10.1109/EUC.2008.33","DOIUrl":"https://doi.org/10.1109/EUC.2008.33","url":null,"abstract":"The aim of human activity recognition is to identify what a user or a group of users are doing at a given point in time, for example travelling or working. Activity recognition plays an important role in mobile and ubiquitous computing both as a goal in itself and as an intermediate task in the design of advanced applications. Virtually all existing activity recognition systems for mobile phones base their predictions on location cues. This approach forces the user to disclose personal information such as her home or work area. In this paper, we present a novel activity recognition system called TRAcME (temporal recognition of activities for mobile environments) which recognises generic human activities from large windows of context, Allenpsilas temporal relations and anonymous landmarks. Unlike existing systems, TRAcME handles simultaneous activities and outputs activities which are consistent with each other at the scale of a userpsilas day.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131968589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking 面向泛在网络的环境网络感知上下文传播方案
D. Balakrishnan, A. Nayak, Pulak Dhar
Ambient Networks enable co-operation between heterogeneous networks, on demand, in order to provide ubiquitous connectivity to end-users. We focus on the part of disseminating context information to enable context-based applications (for e.g., resource update and management) and systems in ambient and ubiquitous networks. Our pure overlay space architecture acts as a base for the development and maintenance of application-layer context-aware dissemination protocols. Our multi-level overlay network based dissemination protocol exhibits dynamic and fair context dissemination. In this paper, we first overview this 'pure overlay' and 'multi-level overlay' combined context dissemination scheme and discuss its constraints in autonomous and heterogeneous environments. We then focus on proposing techniques for improving this dissemination scheme towards ubiquitous networking which satisfies our goals with regard to creating a user-friendly data model. The proposed optimizations include: local transformations, personalized extensions, and hybrid customizations. This paper is complemented with case study evaluation and simulation study results.
环境网络能够在不同的网络之间按需合作,以便为最终用户提供无处不在的连接。我们专注于传播上下文信息的部分,使基于上下文的应用程序(例如,资源更新和管理)和系统在环境和无处不在的网络中。我们的纯覆盖空间架构作为开发和维护应用层上下文感知传播协议的基础。我们的基于多层覆盖网络的传播协议具有动态和公平的上下文传播。在本文中,我们首先概述了“纯覆盖”和“多级覆盖”相结合的上下文传播方案,并讨论了其在自治和异构环境中的约束。然后,我们重点提出了改进这种传播方案的技术,以实现无处不在的网络,从而满足我们关于创建用户友好的数据模型的目标。建议的优化包括:本地转换、个性化扩展和混合自定义。本文辅以案例分析评价和仿真研究结果。
{"title":"CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous Networking","authors":"D. Balakrishnan, A. Nayak, Pulak Dhar","doi":"10.1109/EUC.2008.145","DOIUrl":"https://doi.org/10.1109/EUC.2008.145","url":null,"abstract":"Ambient Networks enable co-operation between heterogeneous networks, on demand, in order to provide ubiquitous connectivity to end-users. We focus on the part of disseminating context information to enable context-based applications (for e.g., resource update and management) and systems in ambient and ubiquitous networks. Our pure overlay space architecture acts as a base for the development and maintenance of application-layer context-aware dissemination protocols. Our multi-level overlay network based dissemination protocol exhibits dynamic and fair context dissemination. In this paper, we first overview this 'pure overlay' and 'multi-level overlay' combined context dissemination scheme and discuss its constraints in autonomous and heterogeneous environments. We then focus on proposing techniques for improving this dissemination scheme towards ubiquitous networking which satisfies our goals with regard to creating a user-friendly data model. The proposed optimizations include: local transformations, personalized extensions, and hybrid customizations. This paper is complemented with case study evaluation and simulation study results.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134472154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances RT-P2P:具有概率定时保证的可扩展实时点对点系统
Fei Huang, B. Ravindran, E. Jensen
In this paper, we present RT-P2P, a real-time peer-to-peer (P2P) system that allows application-level end-to-end timing requirements to be satisfied in P2P systems. Key aspects of our RT-P2P infrastructure include a real-time P2P protocol, real-time communication algorithm, and analytical performance models. We analytically establish the timing properties of RT-P2P. Our simulation studies validate the analytical results and demonstrate RT-P2P outperforms the traditional client-server model in large-scale and dynamic system.
在本文中,我们提出了实时点对点(P2P)系统RT-P2P,它允许在P2P系统中满足应用级端到端时序需求。我们的RT-P2P基础架构的关键方面包括实时P2P协议、实时通信算法和分析性能模型。分析建立了RT-P2P的定时特性。我们的仿真研究验证了分析结果,并证明了RT-P2P在大规模动态系统中优于传统的客户端-服务器模型。
{"title":"RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances","authors":"Fei Huang, B. Ravindran, E. Jensen","doi":"10.1109/EUC.2008.24","DOIUrl":"https://doi.org/10.1109/EUC.2008.24","url":null,"abstract":"In this paper, we present RT-P2P, a real-time peer-to-peer (P2P) system that allows application-level end-to-end timing requirements to be satisfied in P2P systems. Key aspects of our RT-P2P infrastructure include a real-time P2P protocol, real-time communication algorithm, and analytical performance models. We analytically establish the timing properties of RT-P2P. Our simulation studies validate the analytical results and demonstrate RT-P2P outperforms the traditional client-server model in large-scale and dynamic system.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131786703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software 非总线硬件IP自动集成到供软件使用的soc平台
Robert Günzel
The integration of heterogeneous intellectual property hardware (IP) into existing hardware platforms is often only considered with respect to IP cores that provide bus interfaces to their environment. This paper will show that there is a need for, and an advantage to be gained from, incorporating non-bus interface IP so that they can be used by software running on the platformpsilas processor(s). This paper presents a grammar with which services of non-bus interface cores can be described. The paper will show how this description can be used to generate adapters to integrate the IP as well as device drivers to use the IP. Experiments show how the use of this description can reduce the integration effort of non-bus interface cores.
将异构知识产权硬件(IP)集成到现有硬件平台通常只考虑为其环境提供总线接口的IP核。本文将展示整合非总线接口IP的必要性,以及从中获得的优势,以便它们可以被运行在平台和处理器上的软件使用。本文提出了一种描述非总线接口核心服务的语法。本文将展示如何使用此描述来生成适配器以集成IP以及设备驱动程序以使用IP。实验表明,使用这种描述可以减少非总线接口内核的集成工作量。
{"title":"Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software","authors":"Robert Günzel","doi":"10.1109/EUC.2008.140","DOIUrl":"https://doi.org/10.1109/EUC.2008.140","url":null,"abstract":"The integration of heterogeneous intellectual property hardware (IP) into existing hardware platforms is often only considered with respect to IP cores that provide bus interfaces to their environment. This paper will show that there is a need for, and an advantage to be gained from, incorporating non-bus interface IP so that they can be used by software running on the platformpsilas processor(s). This paper presents a grammar with which services of non-bus interface cores can be described. The paper will show how this description can be used to generate adapters to integrate the IP as well as device drivers to use the IP. Experiments show how the use of this description can reduce the integration effort of non-bus interface cores.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113979015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Property Verification for Generic Access Control Models 通用访问控制模型的属性验证
Vincent C. Hu, D. R. Kuhn, Tao Xie
To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for access control models. The approach defines a standardized structure for access control models, providing for both property verification and automated generation of test cases. The approach expresses access control models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify these properties for the access control models and generates test cases via combinatorial covering array for the system implementations of the models.
为了正式而精确地捕获访问控制应该遵循的安全属性,通常编写访问控制模型来弥合策略和机制之间的抽象差距。在本文中,我们提出了一种新的通用的访问控制模型属性验证方法。该方法为访问控制模型定义了一个标准化的结构,提供了属性验证和测试用例的自动生成。该方法用模型检查器的规范语言表示访问控制模型,用属性语言表示通用访问控制属性。然后,该方法使用模型检查器来验证访问控制模型的这些属性,并通过组合覆盖数组为模型的系统实现生成测试用例。
{"title":"Property Verification for Generic Access Control Models","authors":"Vincent C. Hu, D. R. Kuhn, Tao Xie","doi":"10.1109/EUC.2008.22","DOIUrl":"https://doi.org/10.1109/EUC.2008.22","url":null,"abstract":"To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for access control models. The approach defines a standardized structure for access control models, providing for both property verification and automated generation of test cases. The approach expresses access control models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify these properties for the access control models and generates test cases via combinatorial covering array for the system implementations of the models.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux 一种优化嵌入式Linux实时和非实时性能的轻锁管理机制
Maobing Dai, T. Matsui, Y. Ishikawa
In a real-time Linux system, the critical sections are known as the main factor delaying the execution of real-time tasks. Traditional approaches to overcoming this issue have given less consideration to both real-time and non-real-time tasks. In this paper, we propose a new lock management mechanism to improve the real-time performance with a small penalty for non-real-time tasks. Using this mechanism, we guarantee the deadlines of real-time tasks while keeping the penalties accruing for non-real-time tasks small. We implemented a prototype system in Linux 2.6.20. Experimental results showed that the worst-case OS latency of real-time task is reduced to 19% of the original one, while the penalty for a non-real-time task is 10.1% of the original. The results also showed that the lock management mechanism proposed in this paper is efficient and useful for a future real-time Linux system.
在实时Linux系统中,临界区被认为是延迟实时任务执行的主要因素。克服这一问题的传统方法对实时和非实时任务的考虑较少。在本文中,我们提出了一种新的锁管理机制来提高实时性能,并且对非实时任务的损失很小。使用这种机制,我们保证了实时任务的截止日期,同时保持了非实时任务的惩罚较小。我们在Linux 2.6.20中实现了一个原型系统。实验结果表明,该算法将实时任务的最坏情况下的OS延迟降低到原来的19%,而非实时任务的最坏情况下的OS延迟降低到原来的10.1%。结果表明,本文提出的锁管理机制对未来的实时Linux系统是有效的。
{"title":"A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux","authors":"Maobing Dai, T. Matsui, Y. Ishikawa","doi":"10.1109/EUC.2008.56","DOIUrl":"https://doi.org/10.1109/EUC.2008.56","url":null,"abstract":"In a real-time Linux system, the critical sections are known as the main factor delaying the execution of real-time tasks. Traditional approaches to overcoming this issue have given less consideration to both real-time and non-real-time tasks. In this paper, we propose a new lock management mechanism to improve the real-time performance with a small penalty for non-real-time tasks. Using this mechanism, we guarantee the deadlines of real-time tasks while keeping the penalties accruing for non-real-time tasks small. We implemented a prototype system in Linux 2.6.20. Experimental results showed that the worst-case OS latency of real-time task is reduced to 19% of the original one, while the penalty for a non-real-time task is 10.1% of the original. The results also showed that the lock management mechanism proposed in this paper is efficient and useful for a future real-time Linux system.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework to Evaluate and Predict Performances in Virtual Machines Environment 一个评估和预测虚拟机环境性能的框架
Deshi Ye, Qinming He, Hua Chen, Jianhua Che
Virtualization technology becomes more and more important in area of compute science, such as data center and server consolidation. A large number of hypervisors are available to manage the virtualization either on bare hardware or on host operating systems. One of the important task for the designer is to measure and compare the performance overhead of given virtual machines. In this paper, we provide an analytic framework for the performance analyzing either without running a system or in a runnable real system. Meanwhile, analytic performance models that are based on the queue network theory are developed to study the designs of virtual machines. At the end, a case study of the mathematical models is given to illustrate the performance evaluation.
虚拟化技术在数据中心和服务器整合等计算科学领域中发挥着越来越重要的作用。有大量的管理程序可用于管理裸硬件或主机操作系统上的虚拟化。设计人员的重要任务之一是测量和比较给定虚拟机的性能开销。在本文中,我们提供了一个分析框架,可以在不运行系统或在可运行的实际系统中进行性能分析。同时,建立了基于队列网络理论的性能分析模型来研究虚拟机的设计。最后,给出了数学模型的一个实例来说明性能评估。
{"title":"A Framework to Evaluate and Predict Performances in Virtual Machines Environment","authors":"Deshi Ye, Qinming He, Hua Chen, Jianhua Che","doi":"10.1109/EUC.2008.42","DOIUrl":"https://doi.org/10.1109/EUC.2008.42","url":null,"abstract":"Virtualization technology becomes more and more important in area of compute science, such as data center and server consolidation. A large number of hypervisors are available to manage the virtualization either on bare hardware or on host operating systems. One of the important task for the designer is to measure and compare the performance overhead of given virtual machines. In this paper, we provide an analytic framework for the performance analyzing either without running a system or in a runnable real system. Meanwhile, analytic performance models that are based on the queue network theory are developed to study the designs of virtual machines. At the end, a case study of the mathematical models is given to illustrate the performance evaluation.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Load Balancing in Peer-to-Peer Networks Based on Sampling System States 基于采样系统状态的点对点网络负载均衡
Hung-Chang Hsiao, I-Ta Lin, Hao Liao
Virtual servers provide an abstraction layer to exploit the heterogeneity of peers (or nodes) that participate in a peer-to-peer (P2P) network based on the distributed hash table (DHT). In this paper, we present a load-balanced DHT network based on virtual servers. In our proposal, participating peers accept loads proportional to their capacities. By sampling the capacities of peers and workloads of virtual servers in the system, our design approximates the probability distributions for the capacities and workloads. Each node is based on the probability distributions to match their local virtual servers and other peers. Our proposal is developed through rigorous performance analysis, and is evaluated in extensive simulations.
虚拟服务器提供了一个抽象层来利用参与基于分布式哈希表(DHT)的点对点(P2P)网络的对等(或节点)的异构性。本文提出了一种基于虚拟服务器的负载均衡DHT网络。在我们的建议中,参与节点接受与其容量成比例的负载。通过对系统中虚拟服务器的对等节点的容量和工作负载进行抽样,我们的设计近似于容量和工作负载的概率分布。每个节点都基于概率分布来匹配其本地虚拟服务器和其他对等节点。我们的建议是通过严格的性能分析制定的,并在广泛的模拟中进行评估。
{"title":"Load Balancing in Peer-to-Peer Networks Based on Sampling System States","authors":"Hung-Chang Hsiao, I-Ta Lin, Hao Liao","doi":"10.1109/EUC.2008.12","DOIUrl":"https://doi.org/10.1109/EUC.2008.12","url":null,"abstract":"Virtual servers provide an abstraction layer to exploit the heterogeneity of peers (or nodes) that participate in a peer-to-peer (P2P) network based on the distributed hash table (DHT). In this paper, we present a load-balanced DHT network based on virtual servers. In our proposal, participating peers accept loads proportional to their capacities. By sampling the capacities of peers and workloads of virtual servers in the system, our design approximates the probability distributions for the capacities and workloads. Each node is based on the probability distributions to match their local virtual servers and other peers. Our proposal is developed through rigorous performance analysis, and is evaluated in extensive simulations.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Decentralized Workflows in Ambient Environments 在环境中保护分散的工作流
N. Kuntze, J. Schütte
Workflows in the physical world are implemented based on forms printed on paper and signed by the involved people. In contrast workflows in service oriented architectures require a central entity for execution that results in an inflexible system design that is not suitable for ambient environments. Based on an ambient environment example a security approach for decentralized workflows is presented providing authenticity, confidentiality, and non-repudiation for distributed workflow execution.
物理世界中的工作流是基于打印在纸上并由相关人员签名的表单来实现的。相反,面向服务体系结构中的工作流需要一个中心实体来执行,这导致系统设计不灵活,不适合环境。基于一个环境示例,提出了一种分布式工作流的安全方法,为分布式工作流的执行提供了真实性、保密性和不可否认性。
{"title":"Securing Decentralized Workflows in Ambient Environments","authors":"N. Kuntze, J. Schütte","doi":"10.1109/EUC.2008.86","DOIUrl":"https://doi.org/10.1109/EUC.2008.86","url":null,"abstract":"Workflows in the physical world are implemented based on forms printed on paper and signed by the involved people. In contrast workflows in service oriented architectures require a central entity for execution that results in an inflexible system design that is not suitable for ambient environments. Based on an ambient environment example a security approach for decentralized workflows is presented providing authenticity, confidentiality, and non-repudiation for distributed workflow execution.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1