Using effective scheduling strategies to improve turnaround time, slowdown, and utilization is an important consideration in large supercomputing environments. Since such machines have traditionally used non-preemptio...
详细信息
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. these potential t...
详细信息
ISBN:
(纸本)9780769546001
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. these potential threats block sensitive applications to join the Cloud. In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability. the former refers to the protection of sensitive programs/data from disclosing to other users or even the Cloud administrators. the latter concerns with user's capability to verify whether computing results are faithfully calculated. To address SAND, we propose a new Cloud model, Trusted Block as a Service (TBaaS), to provide a confidential and verifiable environment for each sensitive application. TBaaS limits Cloud provider's access of sensitive applications while granting user the ability to verify whether the computation is faithfully carried out. Moreover, it offers high flexibility and low performance overhead.
A new secret-sharing-based e-auction scheme is proposed. distributed bid opening is employed to protect bid privacy. It can achieve all the desired properties for sealed-bid auctions at a reasonable cost. Moreover, at...
详细信息
distributed file-systems are a popular storage abstraction for cloud-computingapplications. they provide generic data access for different applications in order to pass information between computing nodes and to save...
详细信息
the oil and gas industries have been great consumers of parallel and distributedcomputing systems, by frequently running technical applications with intensive processing of terabytes of data. By the emergence of clou...
详细信息
the paper describes the experimental framework for distributed image processing withthe use of multicomputer providing fast development of high-performance remote sensing data processing technologies. Basic principle...
详细信息
ISBN:
(纸本)9783642231773
the paper describes the experimental framework for distributed image processing withthe use of multicomputer providing fast development of high-performance remote sensing data processing technologies. Basic principles of system building, some architectural solutions, and sample implementation of concrete processing technologies are given.
Network simulation is an important tool for testing and evaluating wireless sensor network applications. parallel simulation strategies improve the scalability of these tools. However, achieving high performance depen...
详细信息
ISBN:
(纸本)9781457705137
Network simulation is an important tool for testing and evaluating wireless sensor network applications. parallel simulation strategies improve the scalability of these tools. However, achieving high performance depends on reducing the synchronization overhead among simulation processes. In this paper we present an optimistic simulation algorithm with support for backtracking and re-execution. the algorithm reduces the number of synchronization cycles to the number of transmissions in the network under test. We implement SnapSim, an extension to the popular Avrora simulator, based on this algorithm. the experimental results show that our prototype system improves the performance of Avrora by 2 to 10 times for typical network-centric sensor network applications, and up to three orders of magnitude for applicationsthat use the radio infrequently.
the two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security req...
详细信息
As Cloud computing emerges as a dominant paradigm in distributed systems, it is important to fully understand the underlying technologiesthat make Clouds possible. One technology, and perhaps the most important, is v...
详细信息
the advent of multicore and many core technologies opens new frontiers in computational sciences, making possible intensive computations on affordable computer systems. Our ongoing work is focused on the investigation...
详细信息
暂无评论