this paper proposes a new portable parallel programming interface MpC, Meta process C, for Meta Process Model. the Meta Process Model is a parallel programming padadigm based on a hierarchical shared memory model and ...
详细信息
this paper addresses the possibility that IP, in the role of the common service, is not as general as is needed in order-to directly address application requirements, including scalable storage services, that go beyon...
详细信息
FG is a programming environment for asynchronous programs that run on clusters and fit into a pipeline framework. It enables the programmer to write a series of synchronous functions and represents them as stages of a...
详细信息
A recurrence equation can be solved in parallel by P-scheme, which consists of three phases: the pre-computation, the propagation and the determination. However the speedup is degraded due to the sequentiality of the ...
详细信息
Clusters of networked commercial, off-the-shelf (COTS) workstations are presently used for computation-intensive tasks that were typically assigned to parallel computers in the past. However, it is hardly possible to ...
详细信息
ISBN:
(纸本)0818678135
Clusters of networked commercial, off-the-shelf (COTS) workstations are presently used for computation-intensive tasks that were typically assigned to parallel computers in the past. However, it is hardly possible to predict the timing behavior of such systems or to give guarantees about execution times. In this paper we show how our SONiC(Shared Objects Net-interconnected Computer) system can control timing and partitioning of a workstation as a step towards a distributed real-time system built from COTS components. SONiC provides a class-based programming interface for creation of replicated shared objects of arbitrary, user-defined sizes. Weak consistency protocols are employed to improve system's performance. Our Scheduling Service ensures the requested interactive behavior of a workstation while simultaneously giving a specified number of CPU cycles to parallel tasks. Using off-line scheduling methods we are able to implement real-time Guaranteed Services on COTS workstations.
Mobile platform has been widely used in social computing and networking thanks to its powerful computing and sensing ability. Various mobile sensing frameworks have been developed to facilitate the human participation...
详细信息
ISBN:
(纸本)9780769545769
Mobile platform has been widely used in social computing and networking thanks to its powerful computing and sensing ability. Various mobile sensing frameworks have been developed to facilitate the human participation in social environment. However, problems exist in current solutions such as how to maintain large number of participants to run long-term real social projects. We propose a new sensing paradigm called Volunteer Sensing to provide a suitable framework, which reduces the participants duty and enlarge the usage of resources.
Clustering of data has numerous applications and has been studied extensively. though most of the algorithms in the literature are sequential, many parallel algorithms have also been designed. In this paper we present...
详细信息
ISBN:
(纸本)1880843528
Clustering of data has numerous applications and has been studied extensively. though most of the algorithms in the literature are sequential, many parallel algorithms have also been designed. In this paper we present parallel algorithms with better performance than known algorithms. We consider algorithms that work well in the worst case as well as algorithms with good expected performance.
this paper addresses the problem of building a failure detection service for large scale distributedsystems. We describe failure detection service, which merges some novel proposals and satisfies scalability, flexibi...
详细信息
the security of cloud computing datacenters is an important issue. In recent years, some schemes of encryption and authentication based on hierarchical identity-based key management systems have been developed. Howeve...
详细信息
ISBN:
(纸本)9780769545769
the security of cloud computing datacenters is an important issue. In recent years, some schemes of encryption and authentication based on hierarchical identity-based key management systems have been developed. However, these schemes did not consider the case when PKG (Private Key Generator) went down. In this paper, we proposed an identity-based key management scheme for configurable hierarchical cloud computing environment. the proposed scheme requires fewer computations on encryption, and authentication, and it also provides efficient key reconstruction in case of PKG failures. As a result, the scheme proposed in this paper can reduce the key reconstructing cost efficiently on cloud computing data center.
the research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted withthe main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remedi...
详细信息
ISBN:
(纸本)9780769545769
the research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted withthe main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their customers' additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that follow the same patterns.
暂无评论