首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Scalable and Secure Routing for Large-Scale Sensor Networks 大规模传感器网络的可扩展和安全路由
F. Tang, M. Guo, Minglu Li, Zhijun Wang, Zixue Cheng
Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper, we propose a scalable and secure routing protocol that can work energy-efficiently and resist most of attacks. By hierarchical and long-distance mesh routing, our protocol significantly reduces average number of hops for data transmission. Lightweight security mechanism enables the routing protocol to survive from most attacks against sensor networks.
路由在任何类型的网络中都是一个重要的问题。传感器网络中基于多跳的路由会随着节点数量的增加以及各种攻击而导致性能下降。针对传感器网络中的路由问题,已经提出了许多方法,但它们缺乏对大规模传感器网络中安全路由的足够支持。在本文中,我们提出了一种可扩展且安全的路由协议,该协议可以高效地工作并抵抗大多数攻击。通过分层和远距离网状路由,我们的协议显著减少了数据传输的平均跳数。轻量级的安全机制使路由协议能够抵御大多数针对传感器网络的攻击。
{"title":"Scalable and Secure Routing for Large-Scale Sensor Networks","authors":"F. Tang, M. Guo, Minglu Li, Zhijun Wang, Zixue Cheng","doi":"10.1109/EUC.2008.47","DOIUrl":"https://doi.org/10.1109/EUC.2008.47","url":null,"abstract":"Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper, we propose a scalable and secure routing protocol that can work energy-efficiently and resist most of attacks. By hierarchical and long-distance mesh routing, our protocol significantly reduces average number of hops for data transmission. Lightweight security mechanism enables the routing protocol to survive from most attacks against sensor networks.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Trustworthy and Secure Kiosk Computing for Mobile Users 为流动用户提供可靠和安全的资讯亭计算服务
Dong Zhou, H. Inamura
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particular, the mobile user needs to be assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
用户随身携带的移动设备通常包含用户的私有数据,但具有有限的人机交互功能。但是,在用户和典型的周围环境中,并不缺乏具有丰富计算和用户交互资源的固定计算机或kiosks。在将移动设备与环境信息亭集成时,安全性是一个需要考虑的问题。特别是,移动用户需要确保他正在使用的环境kiosk不包含可能利用其设备上的敏感数据的恶意代码,并且这些敏感数据不会留在kiosk上供攻击者利用。在本文中,我们提出了一种与操作系统无关的方法,用于可靠和安全的kiosk计算。我们的方法支持安全的用户会话发起、强会话隔离和快速会话启动,并减轻了中间人攻击、会话窃取攻击和键盘篡改攻击等一系列安全威胁。
{"title":"Towards Trustworthy and Secure Kiosk Computing for Mobile Users","authors":"Dong Zhou, H. Inamura","doi":"10.1109/EUC.2008.170","DOIUrl":"https://doi.org/10.1109/EUC.2008.170","url":null,"abstract":"A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particular, the mobile user needs to be assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Load Balancing for Lookups in Heterogeneous DHT 异构DHT中查找的自适应负载均衡
Zhi Chen, Guowei Huang, Jingdong Xu, Yang Yang
In DHT based P2P networks, the heterogeneity of node capacity and the skewness in query pattern could result in lookup load imbalance. Indegree adjustment is an effective, light-weighted and heterogeneity-aware approach to balance lookup traffic in local area, but not globally. In this paper we present a hybrid algorithm combining in degree adjustment and virtual server (VS) approaches to address both local and global lookup imbalance in DHT networks. We divide local nodes into zones, and select strong nodes to form a virtual server group (VSG). Hot zones can apply for virtual servers from VSG in order to distribute load in system wide. Nodes and VSs in the zones use indegree adjustment to maintain zone balance. We can therefore significantly improve the load balancing of traffic in these systems, and consequently their performance.Results from experimental evaluation demonstrate the effectiveness of our approach.
在基于DHT的P2P网络中,节点容量的异构性和查询模式的偏性会导致查找负载的不平衡。度调整是一种有效的、轻量级的、异构感知的方法,可以平衡局部查找流量,而不是全局查找流量。本文提出了一种结合度调整和虚拟服务器(VS)方法的混合算法来解决DHT网络中的局部和全局查找不平衡问题。我们将本地节点划分为多个分区,并选择强节点组成虚拟服务器组(VSG)。热区可以从VSG申请虚拟服务器,以便在系统范围内分配负载。分区内的节点和VSs通过度调节来保持分区的平衡。因此,我们可以显著改善这些系统中流量的负载平衡,从而提高它们的性能。实验结果证明了该方法的有效性。
{"title":"Adaptive Load Balancing for Lookups in Heterogeneous DHT","authors":"Zhi Chen, Guowei Huang, Jingdong Xu, Yang Yang","doi":"10.1109/EUC.2008.153","DOIUrl":"https://doi.org/10.1109/EUC.2008.153","url":null,"abstract":"In DHT based P2P networks, the heterogeneity of node capacity and the skewness in query pattern could result in lookup load imbalance. Indegree adjustment is an effective, light-weighted and heterogeneity-aware approach to balance lookup traffic in local area, but not globally. In this paper we present a hybrid algorithm combining in degree adjustment and virtual server (VS) approaches to address both local and global lookup imbalance in DHT networks. We divide local nodes into zones, and select strong nodes to form a virtual server group (VSG). Hot zones can apply for virtual servers from VSG in order to distribute load in system wide. Nodes and VSs in the zones use indegree adjustment to maintain zone balance. We can therefore significantly improve the load balancing of traffic in these systems, and consequently their performance.Results from experimental evaluation demonstrate the effectiveness of our approach.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems 硬实时嵌入式系统全系统节能的通用框架
Gang Zeng, H. Tomiyama, H. Takada, T. Ishihara
A generalized dynamic energy performance scaling (DEPS) framework is proposed for exploring application-specific energy-saving potential in hard real-time embedded systems. This software-centric framework focuses on system-wide energy reduction and takes advantage of possible power control mechanisms to trade off performance for energy savings. Three existing technologies, i.e., dynamic hardware resource configuration (DHRC), dynamic voltage frequency scaling (DVFS), and dynamic power management (DPM) have been employed in this framework to achieve the maximal energy savings. Static and dynamic schemes of DEPS are proposed to deal with stable or variable workload in the embedded systems. Through a case study, its effectiveness has been validated.
为探索硬实时嵌入式系统中特定应用的节能潜力,提出了一种广义动态能源性能缩放(DEPS)框架。这个以软件为中心的框架侧重于系统范围内的节能,并利用可能的功率控制机制来权衡性能以节省能源。该框架采用了三种现有技术,即动态硬件资源配置(DHRC)、动态电压频率缩放(DVFS)和动态电源管理(DPM),以实现最大的节能。针对嵌入式系统中稳定或可变的工作负载,提出了DEPS的静态和动态方案。通过实例分析,验证了该方法的有效性。
{"title":"A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems","authors":"Gang Zeng, H. Tomiyama, H. Takada, T. Ishihara","doi":"10.1109/EUC.2008.101","DOIUrl":"https://doi.org/10.1109/EUC.2008.101","url":null,"abstract":"A generalized dynamic energy performance scaling (DEPS) framework is proposed for exploring application-specific energy-saving potential in hard real-time embedded systems. This software-centric framework focuses on system-wide energy reduction and takes advantage of possible power control mechanisms to trade off performance for energy savings. Three existing technologies, i.e., dynamic hardware resource configuration (DHRC), dynamic voltage frequency scaling (DVFS), and dynamic power management (DPM) have been employed in this framework to achieve the maximal energy savings. Static and dynamic schemes of DEPS are proposed to deal with stable or variable workload in the embedded systems. Through a case study, its effectiveness has been validated.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software 非总线硬件IP自动集成到供软件使用的soc平台
Robert Günzel
The integration of heterogeneous intellectual property hardware (IP) into existing hardware platforms is often only considered with respect to IP cores that provide bus interfaces to their environment. This paper will show that there is a need for, and an advantage to be gained from, incorporating non-bus interface IP so that they can be used by software running on the platformpsilas processor(s). This paper presents a grammar with which services of non-bus interface cores can be described. The paper will show how this description can be used to generate adapters to integrate the IP as well as device drivers to use the IP. Experiments show how the use of this description can reduce the integration effort of non-bus interface cores.
将异构知识产权硬件(IP)集成到现有硬件平台通常只考虑为其环境提供总线接口的IP核。本文将展示整合非总线接口IP的必要性,以及从中获得的优势,以便它们可以被运行在平台和处理器上的软件使用。本文提出了一种描述非总线接口核心服务的语法。本文将展示如何使用此描述来生成适配器以集成IP以及设备驱动程序以使用IP。实验表明,使用这种描述可以减少非总线接口内核的集成工作量。
{"title":"Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software","authors":"Robert Günzel","doi":"10.1109/EUC.2008.140","DOIUrl":"https://doi.org/10.1109/EUC.2008.140","url":null,"abstract":"The integration of heterogeneous intellectual property hardware (IP) into existing hardware platforms is often only considered with respect to IP cores that provide bus interfaces to their environment. This paper will show that there is a need for, and an advantage to be gained from, incorporating non-bus interface IP so that they can be used by software running on the platformpsilas processor(s). This paper presents a grammar with which services of non-bus interface cores can be described. The paper will show how this description can be used to generate adapters to integrate the IP as well as device drivers to use the IP. Experiments show how the use of this description can reduce the integration effort of non-bus interface cores.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113979015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Property Verification for Generic Access Control Models 通用访问控制模型的属性验证
Vincent C. Hu, D. R. Kuhn, Tao Xie
To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for access control models. The approach defines a standardized structure for access control models, providing for both property verification and automated generation of test cases. The approach expresses access control models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify these properties for the access control models and generates test cases via combinatorial covering array for the system implementations of the models.
为了正式而精确地捕获访问控制应该遵循的安全属性,通常编写访问控制模型来弥合策略和机制之间的抽象差距。在本文中,我们提出了一种新的通用的访问控制模型属性验证方法。该方法为访问控制模型定义了一个标准化的结构,提供了属性验证和测试用例的自动生成。该方法用模型检查器的规范语言表示访问控制模型,用属性语言表示通用访问控制属性。然后,该方法使用模型检查器来验证访问控制模型的这些属性,并通过组合覆盖数组为模型的系统实现生成测试用例。
{"title":"Property Verification for Generic Access Control Models","authors":"Vincent C. Hu, D. R. Kuhn, Tao Xie","doi":"10.1109/EUC.2008.22","DOIUrl":"https://doi.org/10.1109/EUC.2008.22","url":null,"abstract":"To formally and precisely capture the security properties that access control should adhere to, access control models are usually written to bridge the rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a new general approach for property verification for access control models. The approach defines a standardized structure for access control models, providing for both property verification and automated generation of test cases. The approach expresses access control models in the specification language of a model checker and expresses generic access control properties in the property language. Then the approach uses the model checker to verify these properties for the access control models and generates test cases via combinatorial covering array for the system implementations of the models.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124054991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux 一种优化嵌入式Linux实时和非实时性能的轻锁管理机制
Maobing Dai, T. Matsui, Y. Ishikawa
In a real-time Linux system, the critical sections are known as the main factor delaying the execution of real-time tasks. Traditional approaches to overcoming this issue have given less consideration to both real-time and non-real-time tasks. In this paper, we propose a new lock management mechanism to improve the real-time performance with a small penalty for non-real-time tasks. Using this mechanism, we guarantee the deadlines of real-time tasks while keeping the penalties accruing for non-real-time tasks small. We implemented a prototype system in Linux 2.6.20. Experimental results showed that the worst-case OS latency of real-time task is reduced to 19% of the original one, while the penalty for a non-real-time task is 10.1% of the original. The results also showed that the lock management mechanism proposed in this paper is efficient and useful for a future real-time Linux system.
在实时Linux系统中,临界区被认为是延迟实时任务执行的主要因素。克服这一问题的传统方法对实时和非实时任务的考虑较少。在本文中,我们提出了一种新的锁管理机制来提高实时性能,并且对非实时任务的损失很小。使用这种机制,我们保证了实时任务的截止日期,同时保持了非实时任务的惩罚较小。我们在Linux 2.6.20中实现了一个原型系统。实验结果表明,该算法将实时任务的最坏情况下的OS延迟降低到原来的19%,而非实时任务的最坏情况下的OS延迟降低到原来的10.1%。结果表明,本文提出的锁管理机制对未来的实时Linux系统是有效的。
{"title":"A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux","authors":"Maobing Dai, T. Matsui, Y. Ishikawa","doi":"10.1109/EUC.2008.56","DOIUrl":"https://doi.org/10.1109/EUC.2008.56","url":null,"abstract":"In a real-time Linux system, the critical sections are known as the main factor delaying the execution of real-time tasks. Traditional approaches to overcoming this issue have given less consideration to both real-time and non-real-time tasks. In this paper, we propose a new lock management mechanism to improve the real-time performance with a small penalty for non-real-time tasks. Using this mechanism, we guarantee the deadlines of real-time tasks while keeping the penalties accruing for non-real-time tasks small. We implemented a prototype system in Linux 2.6.20. Experimental results showed that the worst-case OS latency of real-time task is reduced to 19% of the original one, while the penalty for a non-real-time task is 10.1% of the original. The results also showed that the lock management mechanism proposed in this paper is efficient and useful for a future real-time Linux system.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121389925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework to Evaluate and Predict Performances in Virtual Machines Environment 一个评估和预测虚拟机环境性能的框架
Deshi Ye, Qinming He, Hua Chen, Jianhua Che
Virtualization technology becomes more and more important in area of compute science, such as data center and server consolidation. A large number of hypervisors are available to manage the virtualization either on bare hardware or on host operating systems. One of the important task for the designer is to measure and compare the performance overhead of given virtual machines. In this paper, we provide an analytic framework for the performance analyzing either without running a system or in a runnable real system. Meanwhile, analytic performance models that are based on the queue network theory are developed to study the designs of virtual machines. At the end, a case study of the mathematical models is given to illustrate the performance evaluation.
虚拟化技术在数据中心和服务器整合等计算科学领域中发挥着越来越重要的作用。有大量的管理程序可用于管理裸硬件或主机操作系统上的虚拟化。设计人员的重要任务之一是测量和比较给定虚拟机的性能开销。在本文中,我们提供了一个分析框架,可以在不运行系统或在可运行的实际系统中进行性能分析。同时,建立了基于队列网络理论的性能分析模型来研究虚拟机的设计。最后,给出了数学模型的一个实例来说明性能评估。
{"title":"A Framework to Evaluate and Predict Performances in Virtual Machines Environment","authors":"Deshi Ye, Qinming He, Hua Chen, Jianhua Che","doi":"10.1109/EUC.2008.42","DOIUrl":"https://doi.org/10.1109/EUC.2008.42","url":null,"abstract":"Virtualization technology becomes more and more important in area of compute science, such as data center and server consolidation. A large number of hypervisors are available to manage the virtualization either on bare hardware or on host operating systems. One of the important task for the designer is to measure and compare the performance overhead of given virtual machines. In this paper, we provide an analytic framework for the performance analyzing either without running a system or in a runnable real system. Meanwhile, analytic performance models that are based on the queue network theory are developed to study the designs of virtual machines. At the end, a case study of the mathematical models is given to illustrate the performance evaluation.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116889667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Load Balancing in Peer-to-Peer Networks Based on Sampling System States 基于采样系统状态的点对点网络负载均衡
Hung-Chang Hsiao, I-Ta Lin, Hao Liao
Virtual servers provide an abstraction layer to exploit the heterogeneity of peers (or nodes) that participate in a peer-to-peer (P2P) network based on the distributed hash table (DHT). In this paper, we present a load-balanced DHT network based on virtual servers. In our proposal, participating peers accept loads proportional to their capacities. By sampling the capacities of peers and workloads of virtual servers in the system, our design approximates the probability distributions for the capacities and workloads. Each node is based on the probability distributions to match their local virtual servers and other peers. Our proposal is developed through rigorous performance analysis, and is evaluated in extensive simulations.
虚拟服务器提供了一个抽象层来利用参与基于分布式哈希表(DHT)的点对点(P2P)网络的对等(或节点)的异构性。本文提出了一种基于虚拟服务器的负载均衡DHT网络。在我们的建议中,参与节点接受与其容量成比例的负载。通过对系统中虚拟服务器的对等节点的容量和工作负载进行抽样,我们的设计近似于容量和工作负载的概率分布。每个节点都基于概率分布来匹配其本地虚拟服务器和其他对等节点。我们的建议是通过严格的性能分析制定的,并在广泛的模拟中进行评估。
{"title":"Load Balancing in Peer-to-Peer Networks Based on Sampling System States","authors":"Hung-Chang Hsiao, I-Ta Lin, Hao Liao","doi":"10.1109/EUC.2008.12","DOIUrl":"https://doi.org/10.1109/EUC.2008.12","url":null,"abstract":"Virtual servers provide an abstraction layer to exploit the heterogeneity of peers (or nodes) that participate in a peer-to-peer (P2P) network based on the distributed hash table (DHT). In this paper, we present a load-balanced DHT network based on virtual servers. In our proposal, participating peers accept loads proportional to their capacities. By sampling the capacities of peers and workloads of virtual servers in the system, our design approximates the probability distributions for the capacities and workloads. Each node is based on the probability distributions to match their local virtual servers and other peers. Our proposal is developed through rigorous performance analysis, and is evaluated in extensive simulations.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117300639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Decentralized Workflows in Ambient Environments 在环境中保护分散的工作流
N. Kuntze, J. Schütte
Workflows in the physical world are implemented based on forms printed on paper and signed by the involved people. In contrast workflows in service oriented architectures require a central entity for execution that results in an inflexible system design that is not suitable for ambient environments. Based on an ambient environment example a security approach for decentralized workflows is presented providing authenticity, confidentiality, and non-repudiation for distributed workflow execution.
物理世界中的工作流是基于打印在纸上并由相关人员签名的表单来实现的。相反,面向服务体系结构中的工作流需要一个中心实体来执行,这导致系统设计不灵活,不适合环境。基于一个环境示例,提出了一种分布式工作流的安全方法,为分布式工作流的执行提供了真实性、保密性和不可否认性。
{"title":"Securing Decentralized Workflows in Ambient Environments","authors":"N. Kuntze, J. Schütte","doi":"10.1109/EUC.2008.86","DOIUrl":"https://doi.org/10.1109/EUC.2008.86","url":null,"abstract":"Workflows in the physical world are implemented based on forms printed on paper and signed by the involved people. In contrast workflows in service oriented architectures require a central entity for execution that results in an inflexible system design that is not suitable for ambient environments. Based on an ambient environment example a security approach for decentralized workflows is presented providing authenticity, confidentiality, and non-repudiation for distributed workflow execution.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1