Metadata management is a key technique of data grid. this paper presents a replication and cache based metadata management system (RCMMS) to improve metadata management of Global distributed Storage System (GDSS). Sto...
详细信息
ISBN:
(纸本)0769529097
Metadata management is a key technique of data grid. this paper presents a replication and cache based metadata management system (RCMMS) to improve metadata management of Global distributed Storage System (GDSS). Storage Set-vice Provider (SSP) of GDSS has dedicated buffer to cache metadata. the design, implementation and evaluation of RCMMS are discussed in this paper. RCMMS provides efficient algorithms to manage highly dynamic metadata replicas. the evaluation demonstrates that replica plus cache metadata management system outperforms existing metadata management system of GDSS.
As an effective and popular method to solve big data storage, computation and processing, distributed system has been a widespread hot issue for these years. Withthe continuous development of modern computer, network...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
As an effective and popular method to solve big data storage, computation and processing, distributed system has been a widespread hot issue for these years. Withthe continuous development of modern computer, network and communication technology, distributed systems have also gained very huge development and have shown themselves some different forms in different times. Currently, there are some famous distributed system forms available for modern information processes and communication applications, such as web service, grid computing and cloud computing technology et al. In this paper, we mainly focus on studying the key issues of distributed system firstly, especially, for its beginning development phase, and then discuss the typical forms of the distributed system from its emergence, at the same time;we also show some important applications about up-to-date distributed system. Finally, we talk about the issues of challenges for up-to-date distributed system and the development trends of distributed system in the future.
IEEE 802.16j Multihop relay network is an important research topic, because it can effectively extend coverage. there are some issues requiring deeply thinking in the multihop relay network. One of the major issues is...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
IEEE 802.16j Multihop relay network is an important research topic, because it can effectively extend coverage. there are some issues requiring deeply thinking in the multihop relay network. One of the major issues is hop-by-hop authentication of relay nodes. Another issue is the selection of centralized or distributed security architecture. In this paper, we study the two schemes for authentication in multihop relay network in order to explicitly make a choice which security architecture can better achieve our goal.
VANETs (Vehicular Ad Hoc Networks) aim to provide safety and comfort services for drivers on roads and highways. Among these services, there are computation-intensive tasks in real-time applications that need to be ex...
详细信息
ISBN:
(纸本)9781728148328
VANETs (Vehicular Ad Hoc Networks) aim to provide safety and comfort services for drivers on roads and highways. Among these services, there are computation-intensive tasks in real-time applications that need to be executed as quickly as possible. Using VCC (Vehicular Cloud computing) paradigm, where vehicles offer their underutilized computing resources as a service and withthe goal of reducing the execution time of tasks, this paper investigates how the computation offloading technique can be leveraged to speed up the execution of tasks under different conditions and in varied scenarios. We present an offloading decision algorithm and several simulations results that show we can achieve better processing times than to execute locally and better success rates than random algorithm.
Withthe dramatic increase of users on social network websites, the needs to assist users to manage their large number of contacts as well as providing privacy protection become more and more evident. Unfortunately, l...
详细信息
ISBN:
(纸本)9781467327404;9781467327404
Withthe dramatic increase of users on social network websites, the needs to assist users to manage their large number of contacts as well as providing privacy protection become more and more evident. Unfortunately, limited tools are available to address such needs and reduce users' workload on managing their social relationships. To tackle this issue, we propose an approach to facilitate online social network users to group their contacts into social circles with common interests. Further, we leverage the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. We conducted a user study to evaluate the effectiveness of our solution.
Checkpointing distributed database systems is useful for recovery from failures as well as for audit purposes. In this paper, we present a non-intrusive checkpointing algorithm for distributed database systems. Our ap...
详细信息
ISBN:
(纸本)9783540681397
Checkpointing distributed database systems is useful for recovery from failures as well as for audit purposes. In this paper, we present a non-intrusive checkpointing algorithm for distributed database systems. Our approach uses both checkpoints and transaction logs to capture a transaction-consistent state of the database which helps in reducing overall checkpointing overhead. Out approach is non-intrusive and hence does not block arriving or executing transactions during checkpointing.
In this paper, we investigate the video stream distributed transmission problem for the emergency communication over heterogeneous wireless networks. the key issue of the transmission problem is how to guarantee the q...
详细信息
ISBN:
(纸本)9781612846835;9781612846828
In this paper, we investigate the video stream distributed transmission problem for the emergency communication over heterogeneous wireless networks. the key issue of the transmission problem is how to guarantee the quality of service, when the video stream is transmitted by multiple wireless access networks. According to observed available bit rate (ABR) and round trip time (RTT) over each access network, we propose four distributed rate allocation algorithms with different optimization objectives, in term of the average packet loss rate, the maximum delay, the proportional fairness and the benefit fairness of networks. Simulation results show that these four proposed algorithms can perform well both in fairness and effectiveness. Furthermore, the video distortion minimization algorithm and the maximum delay minimization algorithm tend to be more practical since the video quality is important in the emergency communication.
the concept of Internet-facilitated social networking is not new - we have evidence of the development of the concept and the technologies over decades. However, Web 2.0 technologies and the emergence of social networ...
详细信息
ISBN:
(纸本)9780769531670
the concept of Internet-facilitated social networking is not new - we have evidence of the development of the concept and the technologies over decades. However, Web 2.0 technologies and the emergence of social networking sites has expanded accessibility and use beyond levels that may have been thought imaginable just two or three years ago. these developments have been accompanied with calls to integrate the new technologies and experiences of social networks within formal education. Yet, there is limited research on the potential or outcomes of such initiatives. this paper presents a case study that examines the technology and experience in a formal education context.
Cloud computing is an internet-based pool of heterogeneous resources. the development of Cloud is scalable and reliable to make availability of resources when required to online users. Resources are provided as a serv...
详细信息
ISBN:
(纸本)9781509030385
Cloud computing is an internet-based pool of heterogeneous resources. the development of Cloud is scalable and reliable to make availability of resources when required to online users. Resources are provided as a service on demand with payment done on use basis. Nowadays, for less cost and maximize resource utilization, mainly computing is done on Cloud. Cloud simulator is a collection of java classes that provides simulation of concepts of cloud computing. Cloudlet scheduling is one of the most important task in cloud computing. this paper presents fundamental study on the functions of CloudSim simulator and provides tabulated view of various scheduling algorithms used in cloud environment withtheir parameters and results.
暂无评论