Edge computing has become a promising computing paradigm for building IoT (Internet of things) applications, particularly applications with latency and privacy constraints. However, these applications typically tend t...
详细信息
ISBN:
(纸本)9798400702341
Edge computing has become a promising computing paradigm for building IoT (Internet of things) applications, particularly applications with latency and privacy constraints. However, these applications typically tend to be compute-intensive and compute resources are limited at the edge when compared to the cloud, so it is important to efficiently utilize all computing resources available at the edge. A key challenge in utilizing these resources is the scheduling of different computing tasks in a dynamically varying, highly hybrid computing environment. We describe the design, implementation, and evaluation of a dynamic distributed scheduler for the edge that constantly monitors the current state of the computing infrastructure and dynamically schedules various computing tasks to ensure that all application constraints are met in another paper. Based on that, this paper mainly proposes a profile evaluation method and results when applying an augmented reality application on distributed systems at the edge. Withthat work done, we propose and implement a good solution to efficiently distribute edge AI applications at the edge.
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. One of important aspects in RBAC is constraints that con...
详细信息
ISBN:
(纸本)0769524052
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. One of important aspects in RBAC is constraints that constrain what components in RBAC are allowed to do. there are lots of research have been achieved to specify constraints for secure system developers. However more work is need urgently to met requirements for interoperability of machine and people understandable constraints specification in open and distributed environment. In this paper we propose another approach to specify constraints using Semantic Web technologies. the Web Ontology Language (OWL) specification of basic RBAC components and constraints are described in detail.
For application programs in scientific and technological fields have grown increasingly large and complex, it is becoming more difficult to parallelize these programs by hand using message-passing libraries. To reduce...
详细信息
ISBN:
(纸本)9780769536422
For application programs in scientific and technological fields have grown increasingly large and complex, it is becoming more difficult to parallelize these programs by hand using message-passing libraries. To reduce this difficulty, we are researching the compilation technology for serial program automatic parallelization. In this paper, the author puts forward a kind of parallel recognition algorithm in parallelization compiler. In the algorithm the author adopts the idea of the medium grain parallel. through this algorithm, the parallelization compiler can identify all of the parallelizable blocks. So that the application programs can be speeded lip and the execution ability call be improved when the blocks execute on multiprocessors. parallel processing often can make the run time of application programs shorter than serial processing, but if the radio of parallel workload to overhead about creating parallelthread or the radio of parallel workload to parallelthread number is small, parallel execution can degrades program performance. To solve this problem, the author proposes several parallel optimization approaches in the end of the paper.
Location-based applications such as Facebook Places, Foursquare, or Loopt typically use location services to manage mobile object positions. However, exposing precise user positions raises user privacy concerns, espec...
详细信息
Location-based applications such as Facebook Places, Foursquare, or Loopt typically use location services to manage mobile object positions. However, exposing precise user positions raises user privacy concerns, especially if location service providers are not fully trusted. To enable the secure management of private user positions in non-trusted systems, we present two novel position sharing approaches based on the concept of multi-secret sharing. We improve existing geometric position sharing approaches by Durr et al. [2] and Skvortsov et al. [3] by considering continuous position updates and by increasing the robustness against various attacks. Furthermore, we present the first position sharing approach for symbolic location models. (C) 2013 Elsevier B.V. All rights reserved.
this paper presents an approach for making local search algorithms distributed, to get speed improvements thanks to the growth both in multi-core hardware and the massive availability of distributedcomputing power, n...
详细信息
ISBN:
(纸本)9789897584855
this paper presents an approach for making local search algorithms distributed, to get speed improvements thanks to the growth both in multi-core hardware and the massive availability of distributedcomputing power, notably in the cloud. Local search algorithms rely on the exploration of neighborhoods on a given solution space model. Our distribution approach relies on the exploration of multiple neighborhoods in parallel, performed by different workers located on different CPU cores (locally or distributed). this approach relies on neighborhood combinators, which are composite neighborhoods built out of basic neighborhoods. Combinators allows us to introduce metaheuristics (restart, tabu search, simulated annealing), neighborhood selection (hill-climbing, round-robin) and handle search strategies. We propose some parallel search combinators that can be instantiated to build search strategies encompassing parallel neighborhood exploration. An implementation is proposed in the *** framework, using the Actor model of computation.
Withthe rapid development of information technology, the security of massive amounts of digital data has attracted huge attention in recent years. In this paper, we provide an efficient parallel implementation of the...
详细信息
ISBN:
(纸本)9781509050819
Withthe rapid development of information technology, the security of massive amounts of digital data has attracted huge attention in recent years. In this paper, we provide an efficient parallel implementation of the Advanced Encryption Standard (AES) algorithm, a widely used symmetrical block encryption algorithm, based on the Sunway TaihuLight. the Sunway TaihuLight is a China's independently developed heterogeneous supercomputer with peak performance over 100 PFlops. We also optimize the parallel implementation of the AES algorithm based on the Sunway TaihuLight to achieve more optimized performance. the optimization of the parallel AES algorithm in a single SW26010 node is provided. Specifically, we expand the scale to 1024 nodes and achieve the throughput of about 63.91 GB/s (511.28 Gbits/s). Our parallel implementation of the AES algorithm has great parallel scalability and the speedup ratio can be very high withthe number of nodes increasing.
Blockchain technology has attracted various areas like corporations, education, government, and healthcare because of its unhackable security features. In spite of common arguments about the occurrence of Blockchain t...
详细信息
ISBN:
(纸本)9781538659069
Blockchain technology has attracted various areas like corporations, education, government, and healthcare because of its unhackable security features. In spite of common arguments about the occurrence of Blockchain technology in terms of security and privacy, in reality, several attacks can be launched against them. this paper presents a comprehensive survey of the most vulnerable Blockchain attacks and the different approaches proposed against these attacks. this paper also provides taxonomy of attacks, which are most challengeable to Blockchain security key features. Additionally, a review of the countermeasures, which have offered solutions to avoid these attacks, has been presented.
the performance of metadata processing in large distributed file systems currently presents larger challenges than scaling of data throughput. the paper presents a novel, distributed benchmark called DMetabench for me...
详细信息
ISBN:
(纸本)9783642032745
the performance of metadata processing in large distributed file systems currently presents larger challenges than scaling of data throughput. the paper presents a novel, distributed benchmark called DMetabench for measuring the performance of metadata operations (e.g. file creation). DMetabench runs in environments with potentially thousands of nodes and allows an assessment of the scalability of metadata operations. Additionally, precise run-tune performance data is preserved which allows for a better understanding of performance artifacts. Validation results from production file systems at the Leibniz Supercomputing Centre (LRZ) are provided and discussed. Possible applications of knowledge about metadata performance scaling include the choice of an optimal parallelization strategy for metadata-itensive workload in a specific runtime environment.
Computer vision is a field of computer science which recently received increasingly to the fore. To accelerate computing in image processing can be used specialized processors that work on the principle of accelerator...
详细信息
ISBN:
(纸本)9781467351225;9781467351201
Computer vision is a field of computer science which recently received increasingly to the fore. To accelerate computing in image processing can be used specialized processors that work on the principle of accelerators. Designed arithmetic-logic unit is a processor module, which executes image processing based on the selected instruction. the parallel design of arithmetic-logic unit can also accelerate image processing.
the paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly clas...
详细信息
ISBN:
(纸本)0769524052
the paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly classify the bargaining scenarios and present the optimal bargaining strategy under sub-incomplete information for corresponding bargaining scenarios;then extend them to the optimal pricing strategies under incomplete information condition;thirdly, discuss the conditions for convergence of optimal strategy;Finally, the analysis shows that the bargaining strategic profiles form the sequential equilibrium and the agreement is unique under certain conditions.
暂无评论