Blockchain, the technology behind Bitcoin, is a permissionless distributed database which allows distributed storage and computation over a large network of nodes. this technology has been applied recently to many oth...
详细信息
ISBN:
(纸本)9783319401621;9783319401614
Blockchain, the technology behind Bitcoin, is a permissionless distributed database which allows distributed storage and computation over a large network of nodes. this technology has been applied recently to many other fields besides e-currencies (Bitcoin 2.0 projects). In this paper we present Betfunding: a blockchain-based decentralized crowdfunding platform. On the contrary of regular crowdfunding platforms, our system does not require a central and reliable organization. In Betfutding users bet whether the project will or will not be implemented in a given time frame, increasing the bounty and incentive for potential developers to carry it out.
In sender-initiated load balancing algorithms, the sender continues to send unnecessary request messages for load transfer until a receiver is found while the system load is heavy. Meanwhile, in the receiver-initiated...
详细信息
ISBN:
(纸本)3540240136
In sender-initiated load balancing algorithms, the sender continues to send unnecessary request messages for load transfer until a receiver is found while the system load is heavy. Meanwhile, in the receiver-initiated load balancing algorithms, the receiver continues to send an unnecessary request message for load acquisition until a sender is found while the system load is low. these unnecessary request messages result in inefficient communications, low CPU utilization, and low system throughput in distributedsystems. To solve these problems, we propose a genetic based approach for improved sender-initiated and receiver-initiated load balancing in distributedsystems.
In a desktop grid model, the job (computational task) is submitted for execution in the resource only when the resource is idle. there is no guarantee that the job which has started to execute in a resource will compl...
详细信息
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the...
详细信息
ISBN:
(纸本)9781509055043
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the market to offer corporate customers productivity and security while lowering costs of identity management. System integrators who implement the IDM solutions for their corporate customers often face problems when choosing the right IDM products for integrating withthe customers' enterprise systems. this paper proposes a decision model for IDM product selection which is used in evaluating and ranking IDM products based on the proposed customer requirements questionnaire. the model is comprehensive in that its decision criteria comprise not only the technical specifications of the products but also other important aspects including price and accountability of system integrators and product vendors. Based on the decision model, product selection is conducted using a multi-criteria decision making technique called fuzzy analytic hierarchy process (fuzzy AHP). In an evaluation, a leading system integrator company in thailand applies the proposed approach to IDM product selection for its customer and the result is quite satisfactory.
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi...
详细信息
Large-scale distributedsystems, withthousands or even millions of nodes, produce complex and dynamic behaviors. Packet-level simulation is necessary to test and analyze these systems, such as grids, peer-to-peer (P2...
详细信息
Parallel sorting methods for distributed memory systems often use partitioning algorithms to prepare the redistribution of data items. this article proposes a partitioning algorithm that calculates a redistribution sp...
详细信息
the existing DHT-based file storage systems are suffering problems of being restricted to exact match and lacking semantic-based query. To solve these problems, a DHT-based file storage system named FCAN is proposed. ...
详细信息
ISBN:
(纸本)9780769526942
the existing DHT-based file storage systems are suffering problems of being restricted to exact match and lacking semantic-based query. To solve these problems, a DHT-based file storage system named FCAN is proposed. Mapping a document vector from semantic space to P2P space by FastMap, FCAN can effectively reduce the dimensions of it to implement semantic-based query without affecting the semantic integrality of this document. By clustering the nearest neighbors based on centroid, FCAN is further improved to reduce the redundant messages and search time. Simulations show that FCAN has not only higher recall and precision, but also fewer search time and redundant messages.
the realization of edge-based cyber-physical systems (CPS) poses important challenges in terms of performance, robustness, security, etc. this paper examines a novel approach to providing a user-centric adaptive route...
详细信息
ISBN:
(纸本)9781665412520
the realization of edge-based cyber-physical systems (CPS) poses important challenges in terms of performance, robustness, security, etc. this paper examines a novel approach to providing a user-centric adaptive route planning service over a network of Road Side Units (RSUs) in smart cities. the key idea is to adaptively select routing task parameters such as privacy-cloaked area sizes and number of retained intersections to balance processing time, privacy protection level, and route accuracy for privacy-augmented distributed route search while also handling per-query user preferences. this is formulated as an optimization problem with a set of parameters giving the best result for a set of queries given system constraints. Processing throughput, Privacy Protection, and Travel Time Accuracy were developed as the objective functions to be balanced. A Multi-Objective Genetic Algorithm based technique (NSGA-II) is applied to recover a feasible solution. the performance of this approach was then evaluated using traffic data from Osaka, Japan. Results show good performance of the approach in balancing the aforementioned objectives based on user preferences.
Scientific applications like weather forecasting require high performance and fast response time. But this ideal requirement has always been constrained by peculiarities of underlying platforms specially, distributed ...
详细信息
ISBN:
(纸本)9780769534923
Scientific applications like weather forecasting require high performance and fast response time. But this ideal requirement has always been constrained by peculiarities of underlying platforms specially, distributed platforms. One such constraint is the efficiency of communication between geographically dispersed and physically distributed processes running these applications, that is the efficiency, of inter process communication (IPC) mechanisms. this paper provides hard evidence that an operating system kernel-level implementation of IPC on multicomputers reduces the execution time of a weather forecasting model by nearly half on average compared to when the IPC mechanism is implemented at library level. A well known nonhydrostatic version of the Penn State/NCAR Mesoscale Model, called MM5, is executed on a networked cluster. the performance of MM5 is measured with two distributed implementations of IPC, a kernel-level implementation called DIPC2006 and a renowned library, level implementation called MPI. It is both shown how and argued why the performance of MM5 on a DIPC2006 configured cluster is by far better than its performance on an MPI configured similar cluster. Even ignoring the favorable points of kernel-level implementations, like safety, privilege, reliability, and primitiveness, the insight is twofold. Scientist may look for more efficient distributed implementations of IPC to run their simulations faster, and computer engineers may try harder to develop more efficient distributed implementations of IPC for scientists.
暂无评论