Existing grid models target purely data parallel applications without inter-task communication. This paper proposes a transparent programming model to support communicating parallel tasks in a wide area grid. The prop...
详细信息
Statically estimating the worst case execution time of a program is important for real-time embedded software. This is difficult even in the programming language level due to the inherent difficulty in detecting infea...
详细信息
In this paper, a distributed technique is proposed to assign time slots to the nodes of an ad hoc network for Spatial Time Division Media Access (STDMA) to facilitate collision-free communication. An upper bound is es...
详细信息
ISBN:
(纸本)3540309993
In this paper, a distributed technique is proposed to assign time slots to the nodes of an ad hoc network for Spatial Time Division Media Access (STDMA) to facilitate collision-free communication. An upper bound is established on the length of the time cycle assuming a constant bound on the degree of each node. The proposed algorithm is augmented to adapt with incremental changes in the topology.
internetcomputing is emerging as an important new paradigm in which resource intensive computing is integrated over internet-scale networks. Over these large networks, different users and organizations share their co...
详细信息
ISBN:
(纸本)9780780392762
internetcomputing is emerging as an important new paradigm in which resource intensive computing is integrated over internet-scale networks. Over these large networks, different users and organizations share their computing resources, and computations take place in a distributed fashion. In such an environment, a framework is needed in which the resource providers are given incentives to share their resources. CompuP2P is a light weight architecture for enabling internetcomputing. It uses peer-to-peer networks for sharing of computing resources. CompuP2P create dynamic markets of network accessible computing resources, such as processing power, memory storage, disk space, etc., in a completely distributed, scalable, and fault-tolerant manner. This paper discusses the system architecture, functionality, and applications of the proposed CompuP2P architecture. We have implemented a Java based prototype, and our results show that the system is light-weight and can provide almost a perfect speedup for applications that contain several independent compute-intensive tasks.
An important objective in designing a protocol is to save scarce resources like energy and bandwidth, and avoid the broadcast storm problem [1]. One way of addressing these problems is by forming a small virtual backb...
详细信息
ISBN:
(纸本)3540309993
An important objective in designing a protocol is to save scarce resources like energy and bandwidth, and avoid the broadcast storm problem [1]. One way of addressing these problems is by forming a small virtual backbone. In this paper, we present a distributed clustering algorithm for forming a small backbone in ad-hoe network, based on connected dominating set. The time and message complexity of the algorithm is in O(n).
The problem of global state observation is fundamental to distributed systems. All interactions in distributed systems can be analyzed in terms of the building block formed by the pairwise interactions of intervals be...
详细信息
distributed Sensor networks have a wide range of real-time applications in aerospace, automation, defense, medical imaging, robotics, and weather prediction. Over the past several years, scientists, engineers, and res...
详细信息
Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired security requirements. Validating this integra...
详细信息
ISBN:
(纸本)3540309993
Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired security requirements. Validating this integrated policy is a non-trivial process. This paper addresses the problem of composing, modeling and validating the security policies. We show how the various approaches for composing security policies can be modeled and verified using Alloy, a lightweight modeling system with automatic semantic analysis capability.
With the appearance of a number of e-mail worms in recent years, we urgently need a solution to detect unknown e-mail worms rather than using the traditional solution: signature-based scanning which does not deal with...
详细信息
Cloud computing is now a widely accepted technology, as it provides on-demand services on pay-as-you-use basis. These services are provided over internet, worldwide. Availability is a major concern in this technology....
详细信息
ISBN:
(纸本)9781509067107
Cloud computing is now a widely accepted technology, as it provides on-demand services on pay-as-you-use basis. These services are provided over internet, worldwide. Availability is a major concern in this technology. distributed denial of service (DDoS) attack is used to thwart the availability of cloud services. In this paper, we propose a model to detect DDoS attacks in cloud computing based on artificial neural networks and black hole optimization algorithm.
暂无评论