this paper presents an efficient and scalable approach to solve global optimization problem by distributedparallel tunneling using mobile agents. To use the parallel and concurrent characteristic of the tunneling alg...
详细信息
ISBN:
(纸本)3540240136
this paper presents an efficient and scalable approach to solve global optimization problem by distributedparallel tunneling using mobile agents. To use the parallel and concurrent characteristic of the tunneling algorithms and increase the speed of the computing, we use mobile agents as a tool for parallel implementation in a distributed environment. the experimental results demonstrate the feasibility and the potential of the proposed method.
In this paper a software package for processing and visualization of the molecular dynamics simulation is presented. During the development process the performance issues of the Python programming language were studie...
详细信息
In this paper a software package for processing and visualization of the molecular dynamics simulation is presented. During the development process the performance issues of the Python programming language were studied, as well as the abilities to avoid them. It was also studied the problem of obtaining and processing distributed data stored on multiple computational nodes. An open-source package for scientific visualization Mayavi2 was chosen as a visualization tool. As a result of application this system to the data obtained from MD simulation of the gas and metal plate interaction we were able to observe in the details the effect of adsorption, which is important for many practical applications.
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. (CID)-D-2&R, the Cost-based Intelligent Intrusion Detection and Respo...
详细信息
ISBN:
(纸本)0780378407
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. (CID)-D-2&R, the Cost-based Intelligent Intrusion Detection and Response System, is proposed in the paper, which is originally developed as a facility to deal with network-based attacks and to make effective response automatically and intelligently. the networking environment deployed withthe (CID)-D-2&R consists of two major parts: Guard, which runs on the specific Guarded Host (GH), and Spy, which runs in Guarded Network (GN). the components of the (CID)-D-2&R are introduced, which include intrusion detection, attack classification, damage analysis, attack path rebuilding, resources automatically safeguarding, calamity recovery, and security Officer. the several kinds of data flow in (CID)-D-2&R are discussed, too. While (CID)-D-2&R is only a prototype, some experimental results are also presented.
Self-stabilization is a theoretical framework of non-masking fault-tolerant distributed algorithms. In this paper, we investigate self-stabilizing distributed solutions to the minimal k-redundant dominating set (MRDS)...
详细信息
ISBN:
(纸本)0780378407
Self-stabilization is a theoretical framework of non-masking fault-tolerant distributed algorithms. In this paper, we investigate self-stabilizing distributed solutions to the minimal k-redundant dominating set (MRDS) problem in tree networks. the MRDS problem is a generalization of the well-known dominating set problem in graph theory. For a graph G=(VE), a set M subset of or equal to V is a k-redundant dominating set of G if and only if each vertex not in M is adjacent to at least k vertices in M. We propose a self-stabilizing distributed algorithm that solves the MRDS problem for anonymous tree networks.
Bag-of-Tasks applications are often composed of a large number of independent tasks;hence, they can easily scale out. With public clouds, the (dynamic) expansion of resource capacity in private clouds is much facilita...
详细信息
ISBN:
(纸本)9780769548791
Bag-of-Tasks applications are often composed of a large number of independent tasks;hence, they can easily scale out. With public clouds, the (dynamic) expansion of resource capacity in private clouds is much facilitated. Clearly, cost efficiently running BoT applications in a multi-cloud environment is of great practical importance. In this paper, we investigate how efficiently multiple clouds can be exploited for running BoT applications and present a fully polynomial time randomized approximation scheme (FPRAS) as a novel task assignment algorithm for BoT applications. the resulting task assignment can be optimized in terms of cost, makespan or the tradeoff between them. the objective function incorporated into our algorithm is devised in the way the optimization objective is tunable based on user preference. Our task assignment decisions are made without any prior knowledge of the processing time of tasks, i.e., non-clairvoyant task assignment. We adopt a Monte Carlo sampling method to estimate unknown task running time. the experimental results shows our algorithm approximates the optimal solution with little overhead.
As Internet grows exponentially, scalable routers on backbone are required to provide more number of ports, higher line-rates, and larger capacity under acceptable complexity. Until now, most routers are implemented o...
详细信息
ISBN:
(纸本)9780769533520
As Internet grows exponentially, scalable routers on backbone are required to provide more number of ports, higher line-rates, and larger capacity under acceptable complexity. Until now, most routers are implemented on the centralized single crossbar as the switched backplane fabric. In terms of crosspoint number, however, the complexity of a single Crossbar is unacceptable with large number of ports, which is increased with O(N2). distributed multiple-stage Clos network and parallel Packet Switching fabric were proposed to provide large number of ports and high line-card rate, respectively. To obtain both goals simultaneously, we study a novel multiple-plane and multiple-stage (MPMS) switching fabric in this paper. We first bring out a graphic model for the MPMS fabric based on its topological architecture. then we study the internal connectivity of the MPMS fabric through the concepts of Vertex In-Degree, Vertex Out-Degree and Vertex Mux Degree. Lastly, we analyze the performance of the MPMS fabric including its maximum number of ports, line-rate, switching capacity and complexity of crosspoints by comparison to that of the single-stage Crossbar fabric.
Airborne SAR remote sensing image has the characteristic of large data volume and computation burden, so the processing needs very large computer memory and stronger computation ability. Based on the introduction of t...
详细信息
ISBN:
(纸本)0780378407
Airborne SAR remote sensing image has the characteristic of large data volume and computation burden, so the processing needs very large computer memory and stronger computation ability. Based on the introduction of the SAR image processing procedure, this paper studies the SAR image processing using computer parallel computation technology. the parallel processing mechanism is based on the parallel computer cluster operation and the large virtual shared memory technology. In the Client/Server architecture based SAR image parallel system, agent based network communication plays an important role in the computer performance monitor and burden distribution. In the end, the application of the SAR image parallel processing system in the disaster monitor and assessment system is introduced. the application result illustrates the high efficiency of the system and the feasibility of our research.
Blockchain technology is useful withthe record keeping of digital transactions, IoT, supply chain management etc. However, we have observed that the traditional attacks are possible on blockchain due to lack of robus...
详细信息
ISBN:
(纸本)9781538659069
Blockchain technology is useful withthe record keeping of digital transactions, IoT, supply chain management etc. However, we have observed that the traditional attacks are possible on blockchain due to lack of robust identity management. We found that Sybil attack can cause severe impact in public/permissionless blockchain, in which an attacker can subvert the blockchain by creating a large number of pseudonymous identities (i.e. Fake user accounts) and push legitimate entities in the minority. Such virtual nodes can act like genuine nodes to create disproportionately large influence on the network. this may lead to several other attacks like DoS, DDoS etc. In this paper, a Sybil attack is demonstrated on a blockchain test bed with its impact on the throughput of the system. We propose a solution directive, in which each node monitors the behavior of other nodes and checks for the nodes which are forwarding the blocks of only particular user. Such nodes are quickly identified, blacklisted and notified to other nodes, and thus the Sybil attack can be restricted. We analyze experimental results of the proposed solution.
We assume a wireless sensor and actuator network with nodes that can harvest energy from the environment, and an application deployed in this network, which is structured as a set of cooperating mobile components that...
详细信息
ISBN:
(纸本)9780769548791
We assume a wireless sensor and actuator network with nodes that can harvest energy from the environment, and an application deployed in this network, which is structured as a set of cooperating mobile components that can be placed on any node that provides the required sensor and actuator resources. We propose algorithms that take into account the energy consumption rate of agents as well as energy reserves and harvesting rate of nodes, and decide about the migration of agents in order to improve application availability. Initial evaluation results via simulation show that application availability can be greatly improved compared to having a static application placement.
the paper describes the experimental framework for distributed image processing withthe use of multicomputer providing fast development of high-performance remote sensing data processing technologies. Basic principle...
详细信息
ISBN:
(纸本)9783642231773
the paper describes the experimental framework for distributed image processing withthe use of multicomputer providing fast development of high-performance remote sensing data processing technologies. Basic principles of system building, some architectural solutions, and sample implementation of concrete processing technologies are given.
暂无评论