Chemical-exchange provides a fundamental mechanism by which microorganisms and biological cells communicate. Using this concept and the idea of biological sized nanomachines, this paper explores the detection of a und...
详细信息
In the cloud computing environment, data are encrypted to be stored in many distributed servers. Global Internet service providers such as Google and Yahoo recognized the importance of an Internet service platform and...
详细信息
ISBN:
(纸本)9781467383165
In the cloud computing environment, data are encrypted to be stored in many distributed servers. Global Internet service providers such as Google and Yahoo recognized the importance of an Internet service platform and have used low-priced commercial-node-based and large-scale cluster-based cloud computing platform technologiesthrough R&D. As various data services have been available in the distributedcomputing environment, the distributed management of big data has become a major issue. In the various uses of big data, security vulnerability and privacy invasion may occur due to malicious attackers or inner users. In particular, various types of security vulnerability occur in the block access token, which is used for the permission control of the data block in Hadoop. To supplement the security vulnerability, a secret-sharing-based block access token management technique is suggested in this paper.
We study the traffic characteristics of parallel and high performance computingapplications in this paper. applicationsthat utilize multiple cores are more and more common nowadays due to the emergence of multicore ...
详细信息
ISBN:
(纸本)9781467385312
We study the traffic characteristics of parallel and high performance computingapplications in this paper. applicationsthat utilize multiple cores are more and more common nowadays due to the emergence of multicore processors. However the design nature of single-threaded applications and multi-threaded applications can vary significantly. Furthermore the on-chip communication profile of multicore systems should be analysed and modelled for characterization and simulation purposes. We investigate several applications running on a full system simulation environment. the on-chip communication traces are gathered and analysed. We study the detailed low-level profiles of these applications. the applications are categorized into different groups according to various parallel programming paradigms. We discover that the trace data follow different parameters of power-law model. the problem is solved by applying least-squares linear regression. We propose a generic synthetic traffic model based on the analysis results.
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. Considering mobil...
详细信息
ISBN:
(纸本)9781467383165
Wireless Mesh Networks (WMNs) are attracting a lot of attention from wireless network researchers, because of their potential use in several fields such as collaborative computing and communications. Considering mobility of the terminals, routing is a key process for operation of WMNs. In this paper, we present the implementation of a testbed for WMNs. We analyze the performance of Optimized Link State Routing (OLSR) protocol and paralleldistributed processing in an indoor scenario. For evaluation we considered hop count, delay, jitter and processing time metrics. the experimental results show that the nodes in the testbed were communicating smoothly. the processing time for node 1 is smaller than other nodes.
In latest years modern world's needs of safety caused a speed spreading of video surveillance systems, more and more frequently collocated in the most crowded places. thus, a lot of theoretical approaches working ...
详细信息
In latest years modern world's needs of safety caused a speed spreading of video surveillance systems, more and more frequently collocated in the most crowded places. thus, a lot of theoretical approaches working with data coming from heterogeneous sources and defining some very complex event detection algorithms have been proposed in the literature. In this paper, we present a distributed framework for event detection in video surveillance context. the overall process is described, starting from the video frames captured by different kinds of sensors and cameras till at the end some high-level event detection algorithms performed in a distributed environment for finding potentially dangerous activities are applied. the conducted experiments confirm the efficiency achieved by our distributed framework.
Virtualization technologies has been widely adopted by large-scale cloud computing platforms. these virtualized systems employ distributed resource management (DRM) to achieve high resource utilization and energy savi...
详细信息
ISBN:
(纸本)9781450334501
Virtualization technologies has been widely adopted by large-scale cloud computing platforms. these virtualized systems employ distributed resource management (DRM) to achieve high resource utilization and energy savings by dynamically migrating and consolidating virtual machines. DRM schemes usually use operating-system-level metrics, such as CPU utilization, memory capacity demand and I/O utilization, to detect and balance resource contention. However, they are oblivious to microarchitecture-level resource interference (e.g., memory bandwidth contention between different VMs running on a host), which is currently not exposed to the operating system. We observe that the lack of visibility into microarchitecture-level resource interference significantly impacts the performance of virtualized systems. Motivated by this observation, we propose a novel architecture-aware DRM scheme (A-DRM), that takes into account microarchitecture-level resource interference when making migration decisions in a virtualized cluster. A-DRM makes use of three core techniques: 1) a profiler to monitor the microarchitecture-level resource usage behavior online for each physical host, 2) a memory bandwidth interference model to assess the interference degree among virtual machines on a host, and 3) a cost-benefit analysis to determine a candidate virtual machine and a host for migration. Real system experiments on thirty randomly selected combinations of applications from the CPU2006, PARSEC, STREAM, NAS parallel Benchmark suites in a four-host virtualized cluster show that A-DRM can improve performance by up to 26.55%, with an average of 9.67%, compared to traditional DRM schemes that lack visibility into microarchitecture-level resource utilization and contention.
this paper presents the experimental evaluation of data mapping techniques in the shared memory of an embedded GPU. the evaluated technique, previously presented in the literature in other contexts, aims at partitioni...
详细信息
ISBN:
(纸本)9781467394741
this paper presents the experimental evaluation of data mapping techniques in the shared memory of an embedded GPU. the evaluated technique, previously presented in the literature in other contexts, aims at partitioning an array across the shared memory physical banks, so as to increase parallel accesses, resulting in appreciable gains in terms of both performance and energy efficiency. the paper presents the experimental setup used for characterizing physically the behaviour of the platform, allowing a validation and a closer understanding of the evaluated memory mapping technique.
Paper presents an advanced Iterative MapReduce MPI oil reservoir simulator. First we present an overview of working implementations that make use of the same technologies. then we define an academic example of numeric...
详细信息
ISBN:
(纸本)9781467385312
Paper presents an advanced Iterative MapReduce MPI oil reservoir simulator. First we present an overview of working implementations that make use of the same technologies. then we define an academic example of numeric problem with an emphasis on its computational features. We present a distributedparallel algorithm of hybrid solution of the problem using MapReduce Hadoop and MPI technologies and describe an improved variant of the algorithm using memory-mapped files.
the existing set of Peer-to-Peer (P2P) digital repositories were not originally and purposely designed for sharing learning content, and as such are not well suited in the same way that centralized repositories are fo...
详细信息
ISBN:
(纸本)9781467394741
the existing set of Peer-to-Peer (P2P) digital repositories were not originally and purposely designed for sharing learning content, and as such are not well suited in the same way that centralized repositories are for the storing and retrieving of learning content for instructional use. this survey paper therefore reviews some P2P file-sharing and related eLearning technologies, to identify core reasons why there are no P2P eLearning Systems with features comparable to the ubiquitous client/server eLearning Systems. It concludes that P2P sharing of Reusable Learning Content requires a redesign in order to facilitate more comprehensive P2P eLearning Systems.
An interesting challenge in E-health is to perform real-time diagnosis. In many distributedcomputing systems the data processing stage, generally assigned on standard computational CPU environments, is a critical asp...
详细信息
ISBN:
(纸本)9781467394741
An interesting challenge in E-health is to perform real-time diagnosis. In many distributedcomputing systems the data processing stage, generally assigned on standard computational CPU environments, is a critical aspect. In particular, the analysis of magnetic resonance imaging (MRI) for improving the quality of images and helping the diagnosis requires an high computational complexity. Using Graphics Processing Units (GPUs) on High Performance computing (HPC), the images processing step can be accelerated by speeding the whole diagnosis procedure. In this paper, we propose a parallel algorithm, on a GPU environment, for MRI denoising in order to make the diagnostic system more efficient. As case study, we consider the Optimized Blockwise Non Local Means (OB-NLM) method. Its intrinsic nature makes it perfectly suited for parallelization and multithreading implementation, especially for GPUs architectures. the results show a significant improvement of the entire healthcare practice procedure in terms of performances.
暂无评论